Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

FBI MoneyPak but Safe Mode is in a restart loop


  • This topic is locked This topic is locked
22 replies to this topic

#1 ClearFocus

ClearFocus

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 29 March 2013 - 10:22 PM

This is my uncle's Windows Vista desktop PC.  Normal mode is nothing but the infamous FBI MoneyPak virus.  However, when I attempt to enter Safe Mode, as soon as the desktop appears, it immediately does a restart.  Any help is appreciated.



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:56 AM

Posted 29 March 2013 - 10:23 PM


Hello ClearFocus

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
  • To enter System Recovery Options by using Windows installation disc:
    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.
    On the System Recovery Options menu you will get the following options:

      • Startup Repair
        System Restore
        Windows Complete PC Restore
        Windows Memory Diagnostic Tool
        Command Prompt
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
      Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • First Press the Scan button.
    • It will make a log (FRST.txt)
    • Second Type the following in the edit box after "Search:". services.exe
    • Click the Search button
    • It will make a log (Search.txt)
    I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

    Gringo





I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 ClearFocus

ClearFocus
  • Topic Starter

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 29 March 2013 - 11:48 PM

Thanks for the help Gringo.  Here are the two log files ...

 

FRST.txt Report

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 13-03-2013 (ATTENTION: FRST version is 17 days old)
Ran by SYSTEM at 30-03-2013 00:41:24
Running from I:\
Windows Vista ™ Home Premium   (X86) OS Language: English(US)
The current controlset is ControlSet001

==================== Registry (Whitelisted) ===================

HKLM\...\Run: [RtHDVCpl] RtHDVCpl.exe [x]
HKLM\...\Run: [CHotkey] zHotkey.exe [x]
HKLM\...\Run: [ShowWnd] ShowWnd.exe [x]
HKLM\...\Run: [ModPS2] ModPS2Key.exe [x]
HKLM\...\Run: [amd_dc_opt] C:\Program Files\AMD\Dual-Core Optimizer\amd_dc_opt.exe [77824 2006-11-17] (AMD)
HKLM\...\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup [13535776 2008-06-19] (NVIDIA Corporation)
HKLM\...\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit [92704 2008-06-19] (NVIDIA Corporation)
HKLM\...\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59240 2011-09-27] (Apple Inc.)
HKLM\...\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime [421888 2011-10-24] (Apple Inc.)
HKLM\...\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM\...\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" [252848 2012-07-03] (Sun Microsystems, Inc.)
HKLM\...\Run: [SearchProtectAll] C:\Program Files\SearchProtect\bin\cltmng.exe [2731296 2013-03-06] (Conduit)
HKLM\...\Run: [DATAMNGR] C:\PROGRA~1\SETTIN~1\Datamngr\DATAMN~1.EXE [1684016 2013-02-05] (Koyote-Lab, inc)
HKU\Best Buy\...\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe [125952 2008-01-18] (Microsoft Corporation)
HKU\Best Buy\...\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe [202240 2008-01-18] (Microsoft Corporation)
HKU\Best Buy\...\Run: [SearchProtect] C:\Users\Best Buy\AppData\Roaming\SearchProtect\bin\cltmng.exe [2731296 2013-03-06] (Conduit)
HKU\Best Buy\...\Run: [Yontoo Desktop] "C:\Users\Best Buy\AppData\Roaming\Yontoo\YontooDesktop.exe" [42784 2013-03-22] (Yontoo LLC)
HKU\Best Buy\...\Winlogon: [Shell] explorer.exe,C:\Users\Best Buy\AppData\Roaming\skype.dat [86528 2013-03-24] ()
HKLM\...\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe [40072 2007-04-17] (soft thinks)
Winlogon\Notify\DfLogon: LogonDll.dll [X]
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
AppInit_DLLs: C:\PROGRA~2\Wincert\WIN32C~1.DLL C:\PROGRA~1\SETTIN~1\Datamngr\datamngr.dll C:\PROGRA~1\SETTIN~1\Datamngr\IEBHO.dll
Startup: C:\ProgramData\Start Menu\Programs\Startup\Microsoft Office.lnk
ShortcutTarget: Microsoft Office.lnk -> C:\Program Files\Microsoft Office\Office10\OSA.EXE (Microsoft Corporation)

==================== Services (Whitelisted) ===================

2 Apple Mobile Device; "C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe" [144712 2009-06-05] (Apple Inc.)
2 CltMngSvc; C:\Program Files\SearchProtect\bin\CltMngSvc.exe [93984 2013-03-06] (Conduit)
2 N360; "C:\Program Files\Norton 360\Engine\20.3.0.36\ccSvcHst.exe" /s "N360" /m "C:\Program Files\Norton 360\Engine\20.3.0.36\diMaster.dll" /prefetch:1 [551728 2013-02-06] (Symantec Corporation)
2 PnkBstrA; C:\Windows\system32\PnkBstrA.exe [66872 2011-07-26] ()
2 PnkBstrB; C:\Windows\system32\PnkBstrB.exe [107832 2011-07-26] ()
2 vseamps; "C:\Program Files\Common Files\Authentium\AntiVirus5\vseamps.exe" [117288 2010-04-08] (Authentium, Inc)
2 vsedsps; "C:\Program Files\Common Files\Authentium\AntiVirus5\vsedsps.exe" [117288 2010-04-08] (Authentium, Inc)
2 vseqrts; "C:\Program Files\Common Files\Authentium\AntiVirus5\vseqrts.exe" [154152 2010-04-08] (Authentium, Inc)
2 WajamUpdater; "C:\Program Files\Wajam\Updater\WajamUpdater.exe" [109064 2012-07-26] (Wajam)
2 Yontoo Desktop Updater; "C:\Program Files\Yontoo\Y2Desktop.Updater.exe" "C:\Users\Best Buy\AppData\Roaming\Yontoo\YontooDesktop.exe" [42784 2013-03-22] (Yontoo LLC)
3 ACDaemon; C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe [x]
2 McNASvc; "c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe" [x]

==================== Drivers (Whitelisted) ====================

3 61883; C:\Windows\System32\DRIVERS\61883.sys [45696 2008-01-18] (Microsoft Corporation)
3 ac97intc; C:\Windows\System32\drivers\ac97intc.sys [108032 2006-11-01] (Intel Corporation)
3 AmdLLD; C:\Windows\System32\DRIVERS\AmdLLD.sys [33280 2006-11-01] (AMD, Inc.)
3 AVer88xHD; C:\Windows\System32\drivers\AVer88xHD.sys [401408 2007-04-08] (AVerMedia TECHNOLOGIES, Inc.)
1 BHDrvx86; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.2.1.22\Definitions\BASHDefs\20130301.001\BHDrvx86.sys [997464 2013-01-16] (Symantec Corporation)
1 ccSet_N360; C:\Windows\system32\drivers\N360\1403000.024\ccSetx86.sys [134304 2012-11-15] (Symantec Corporation)
1 eeCtrl; \??\C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys [376480 2012-08-09] (Symantec Corporation)
3 EraserUtilRebootDrv; \??\C:\Program Files\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [106656 2012-08-30] (Symantec Corporation)
3 ialm; C:\Windows\System32\DRIVERS\ialmnt5.sys [1302492 2006-11-01] (Intel Corporation)
1 IDSVix86; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.2.1.22\Definitions\IPSDefs\20130322.001\IDSvix86.sys [386720 2013-02-06] (Symantec Corporation)
3 NAVENG; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.2.1.22\Definitions\VirusDefs\20130324.007\NAVENG.SYS [93296 2013-02-05] (Symantec Corporation)
3 NAVEX15; \??\C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.2.1.22\Definitions\VirusDefs\20130324.007\NAVEX15.SYS [1603824 2013-02-05] (Symantec Corporation)
1 NEOFLTR_620_13649; \??\C:\Windows\system32\Drivers\NEOFLTR_620_13649.SYS [64480 2008-10-21] (Juniper Networks)
3 NETw2v32; C:\Windows\System32\DRIVERS\NETw2v32.sys [2589184 2006-11-01] (Intel® Corporation)
2 PrismXL; C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS [65536 2007-05-21] (New Boundary Technologies, Inc.)
3 SRTSP; C:\Windows\System32\Drivers\N360\1403000.024\SRTSP.SYS [602712 2013-01-28] (Symantec Corporation)
1 SRTSPX; C:\Windows\system32\drivers\N360\1403000.024\SRTSPX.SYS [32344 2013-01-28] (Symantec Corporation)
0 SymDS; C:\Windows\System32\drivers\N360\1403000.024\SYMDS.SYS [367704 2013-01-21] (Symantec Corporation)
0 SymEFA; C:\Windows\System32\drivers\N360\1403000.024\SYMEFA.SYS [934488 2013-01-30] (Symantec Corporation)
3 SymEvent; \??\C:\Windows\system32\Drivers\SYMEVENT.SYS [142496 2013-02-06] (Symantec Corporation)
1 SymIRON; C:\Windows\system32\drivers\N360\1403000.024\Ironx86.SYS [175264 2012-11-15] (Symantec Corporation)
1 SYMTDIv; C:\Windows\System32\Drivers\N360\1403000.024\SYMTDIV.SYS [350368 2013-01-30] (Symantec Corporation)
4 blbdrive; C:\Windows\system32\drivers\blbdrive.sys [x]
1 Cdr4_xp;  [x]
1 Cdralw2k;  [x]
3 IpInIp; C:\Windows\System32\DRIVERS\ipinip.sys [x]
3 lmimirr; C:\Windows\System32\DRIVERS\lmimirr.sys [x]
3 NwlnkFlt; C:\Windows\System32\DRIVERS\nwlnkflt.sys [x]
3 NwlnkFwd; C:\Windows\System32\DRIVERS\nwlnkfwd.sys [x]
0 PxHelp20; C:\Windows\System32\Drivers\PxHelp20.sys [x]

==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2013-03-30 00:41 - 2013-03-30 00:41 - 00000000 ____D C:\FRST
2013-03-24 12:20 - 2013-03-24 05:28 - 00086528 ___RA C:\Users\Best Buy\Application Data\skype.dat
2013-03-24 12:20 - 2013-03-24 05:28 - 00086528 ___RA C:\Users\Best Buy\AppData\Roaming\skype.dat
2013-03-24 05:34 - 2013-03-29 20:37 - 00000004 ____A C:\Users\Best Buy\Application Data\skype.ini
2013-03-24 05:34 - 2013-03-29 20:37 - 00000004 ____A C:\Users\Best Buy\AppData\Roaming\skype.ini
2013-03-24 04:30 - 2013-03-28 15:13 - 00000000 ____D C:\Users\Best Buy\Application Data\Yontoo
2013-03-24 04:30 - 2013-03-28 15:13 - 00000000 ____D C:\Users\Best Buy\AppData\Roaming\Yontoo
2013-03-24 04:30 - 2013-03-24 04:30 - 00000928 ____A C:\Users\Best Buy\Desktop\Play Games.lnk
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Wincert
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Mozilla
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Application Data\Wincert
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Application Data\Mozilla
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\Program Files\Yontoo
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\Program Files\FGIcon
2013-03-24 04:29 - 2013-03-24 04:30 - 00000000 ____D C:\Program Files\Wajam
2013-03-24 04:29 - 2013-03-24 04:30 - 00000000 ____D C:\Program Files\Settings Alerter
2013-03-14 13:36 - 2013-03-14 13:36 - 00000000 ____D C:\Program Files\SearchProtect
2013-03-14 13:36 - 2013-03-06 02:38 - 00770384 ____A (Microsoft Corporation) C:\Windows\System32\msvcr100.dll
2013-03-14 13:36 - 2013-03-06 02:38 - 00421200 ____A (Microsoft Corporation) C:\Windows\System32\msvcp100.dll
2013-03-14 13:35 - 2013-03-14 13:36 - 00000000 ____D C:\Users\Best Buy\Application Data\SearchProtect
2013-03-14 13:35 - 2013-03-14 13:36 - 00000000 ____D C:\Users\Best Buy\AppData\Roaming\SearchProtect
2013-03-14 13:35 - 2013-03-14 13:35 - 00000000 ____D C:\Program Files\Produtools_Manuals_2.1_B
2013-03-13 11:33 - 2013-02-11 17:57 - 00015872 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\usb8023.sys
2013-03-13 11:33 - 2013-02-01 20:09 - 12321792 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.dll
2013-03-13 11:33 - 2013-02-01 19:42 - 09738240 ____A (Microsoft Corporation) C:\Windows\System32\ieframe.dll
2013-03-13 11:33 - 2013-02-01 19:38 - 01800704 ____A (Microsoft Corporation) C:\Windows\System32\jscript9.dll
2013-03-13 11:33 - 2013-02-01 19:31 - 01103872 ____A (Microsoft Corporation) C:\Windows\System32\urlmon.dll
2013-03-13 11:33 - 2013-02-01 19:30 - 01427968 ____A (Microsoft Corporation) C:\Windows\System32\inetcpl.cpl
2013-03-13 11:33 - 2013-02-01 19:30 - 01129472 ____A (Microsoft Corporation) C:\Windows\System32\wininet.dll
2013-03-13 11:33 - 2013-02-01 19:29 - 00231936 ____A (Microsoft Corporation) C:\Windows\System32\url.dll
2013-03-13 11:33 - 2013-02-01 19:27 - 00065024 ____A (Microsoft Corporation) C:\Windows\System32\jsproxy.dll
2013-03-13 11:33 - 2013-02-01 19:26 - 00717824 ____A (Microsoft Corporation) C:\Windows\System32\jscript.dll
2013-03-13 11:33 - 2013-02-01 19:26 - 00420864 ____A (Microsoft Corporation) C:\Windows\System32\vbscript.dll
2013-03-13 11:33 - 2013-02-01 19:26 - 00142848 ____A (Microsoft Corporation) C:\Windows\System32\ieUnatt.exe
2013-03-13 11:33 - 2013-02-01 19:25 - 00607744 ____A (Microsoft Corporation) C:\Windows\System32\msfeeds.dll
2013-03-13 11:33 - 2013-02-01 19:23 - 02382848 ____A (Microsoft Corporation) C:\Windows\System32\mshtml.tlb
2013-03-13 11:33 - 2013-02-01 19:23 - 01796096 ____A (Microsoft Corporation) C:\Windows\System32\iertutil.dll
2013-03-13 11:33 - 2013-02-01 19:23 - 00073216 ____A (Microsoft Corporation) C:\Windows\System32\mshtmled.dll
2013-03-13 11:33 - 2013-02-01 19:20 - 00176640 ____A (Microsoft Corporation) C:\Windows\System32\ieui.dll
2013-03-09 12:18 - 2013-03-09 12:17 - 00262560 ____A (Oracle Corporation) C:\Windows\System32\javaws.exe
2013-03-09 12:17 - 2013-03-09 12:17 - 00094112 ____A (Oracle Corporation) C:\Windows\System32\WindowsAccessBridge.dll

==================== One Month Modified Files and Folders ========

2013-03-29 20:37 - 2013-03-24 05:34 - 00000004 ____A C:\Users\Best Buy\Application Data\skype.ini
2013-03-29 20:37 - 2013-03-24 05:34 - 00000004 ____A C:\Users\Best Buy\AppData\Roaming\skype.ini
2013-03-29 20:37 - 2006-11-02 05:01 - 00032548 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-03-29 20:37 - 2006-11-02 05:01 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-03-29 20:36 - 2013-02-17 09:27 - 00002419 ____A C:\Windows\setupact.log
2013-03-29 20:36 - 2010-06-22 15:10 - 00000882 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-03-29 20:36 - 2006-11-02 04:47 - 00003296 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2013-03-29 20:36 - 2006-11-02 04:47 - 00003296 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2013-03-29 20:29 - 2007-05-20 22:14 - 01772947 ____A C:\Windows\WindowsUpdate.log
2013-03-29 20:25 - 2012-07-06 14:33 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-03-29 20:20 - 2013-02-20 08:42 - 00000680 ____A C:\Users\Best Buy\Local Settings\d3d9caps.dat
2013-03-29 20:20 - 2013-02-20 08:42 - 00000680 ____A C:\Users\Best Buy\Local Settings\Application Data\d3d9caps.dat
2013-03-29 20:20 - 2013-02-20 08:42 - 00000680 ____A C:\Users\Best Buy\AppData\Local\d3d9caps.dat
2013-03-29 19:50 - 2010-06-22 15:10 - 00000886 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-03-29 19:44 - 2006-11-02 02:33 - 01877048 ____A C:\Windows\System32\PerfStringBackup.INI
2013-03-28 15:13 - 2013-03-24 04:30 - 00000000 ____D C:\Users\Best Buy\Application Data\Yontoo
2013-03-28 15:13 - 2013-03-24 04:30 - 00000000 ____D C:\Users\Best Buy\AppData\Roaming\Yontoo
2013-03-28 05:39 - 2013-02-20 08:43 - 00000000 ____A C:\END
2013-03-24 11:03 - 2006-11-02 03:18 - 00000000 ____D C:\Windows\System32\LogFiles
2013-03-24 05:35 - 2013-02-17 15:03 - 00009374 ____A C:\Windows\PFRO.log
2013-03-24 05:28 - 2013-03-24 12:20 - 00086528 ___RA C:\Users\Best Buy\Application Data\skype.dat
2013-03-24 05:28 - 2013-03-24 12:20 - 00086528 ___RA C:\Users\Best Buy\AppData\Roaming\skype.dat
2013-03-24 04:35 - 2009-05-28 17:41 - 00000000 ____D C:\Program Files\Mozilla Firefox
2013-03-24 04:33 - 2012-07-06 09:19 - 00000416 ____A C:\Users\Best Buy\Desktop\Insight Webmail.website
2013-03-24 04:30 - 2013-03-24 04:30 - 00000928 ____A C:\Users\Best Buy\Desktop\Play Games.lnk
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Wincert
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Mozilla
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Application Data\Wincert
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\ProgramData\Application Data\Mozilla
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\Program Files\Yontoo
2013-03-24 04:30 - 2013-03-24 04:30 - 00000000 ____D C:\Program Files\FGIcon
2013-03-24 04:30 - 2013-03-24 04:29 - 00000000 ____D C:\Program Files\Wajam
2013-03-24 04:30 - 2013-03-24 04:29 - 00000000 ____D C:\Program Files\Settings Alerter
2013-03-14 13:36 - 2013-03-14 13:36 - 00000000 ____D C:\Program Files\SearchProtect
2013-03-14 13:36 - 2013-03-14 13:35 - 00000000 ____D C:\Users\Best Buy\Application Data\SearchProtect
2013-03-14 13:36 - 2013-03-14 13:35 - 00000000 ____D C:\Users\Best Buy\AppData\Roaming\SearchProtect
2013-03-14 13:35 - 2013-03-14 13:35 - 00000000 ____D C:\Program Files\Produtools_Manuals_2.1_B
2013-03-14 13:35 - 2011-12-07 09:03 - 00000000 ____D C:\Users\Best Buy\Local Settings\Conduit
2013-03-14 13:35 - 2011-12-07 09:03 - 00000000 ____D C:\Users\Best Buy\Local Settings\Application Data\Conduit
2013-03-14 13:35 - 2011-12-07 09:03 - 00000000 ____D C:\Users\Best Buy\AppData\Local\Conduit
2013-03-13 11:54 - 2009-07-19 07:25 - 00000000 ____D C:\Program Files\Microsoft Silverlight
2013-03-13 11:36 - 2006-11-02 02:24 - 69796088 ____A (Microsoft Corporation) C:\Windows\System32\mrt.exe
2013-03-13 10:58 - 2007-07-11 03:16 - 00033792 ____A C:\Users\Best Buy\Local Settings\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2013-03-13 10:58 - 2007-07-11 03:16 - 00033792 ____A C:\Users\Best Buy\Local Settings\Application Data\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2013-03-13 10:58 - 2007-07-11 03:16 - 00033792 ____A C:\Users\Best Buy\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2013-03-12 12:25 - 2012-07-06 14:33 - 00693976 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerApp.exe
2013-03-12 12:25 - 2011-06-09 10:06 - 00073432 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerCPLApp.cpl
2013-03-09 12:17 - 2013-03-09 12:18 - 00262560 ____A (Oracle Corporation) C:\Windows\System32\javaws.exe
2013-03-09 12:17 - 2013-03-09 12:17 - 00094112 ____A (Oracle Corporation) C:\Windows\System32\WindowsAccessBridge.dll
2013-03-09 12:17 - 2013-02-23 11:01 - 00174496 ____A (Oracle Corporation) C:\Windows\System32\javaw.exe
2013-03-09 12:17 - 2013-02-23 11:01 - 00174496 ____A (Oracle Corporation) C:\Windows\System32\java.exe
2013-03-09 12:17 - 2012-07-06 16:01 - 00861088 ____A (Oracle Corporation) C:\Windows\System32\npDeployJava1.dll
2013-03-09 12:17 - 2010-05-23 11:23 - 00782240 ____A (Oracle Corporation) C:\Windows\System32\deployJava1.dll
2013-03-09 12:17 - 2007-05-20 22:41 - 00000000 ____D C:\Program Files\Java
2013-03-06 02:38 - 2013-03-14 13:36 - 00770384 ____A (Microsoft Corporation) C:\Windows\System32\msvcr100.dll
2013-03-06 02:38 - 2013-03-14 13:36 - 00421200 ____A (Microsoft Corporation) C:\Windows\System32\msvcp100.dll
2013-02-28 05:06 - 2012-02-07 14:06 - 00000000 ____D C:\Windows\System32\Drivers\N360
2013-02-28 05:05 - 2012-02-07 14:07 - 00002066 ____A C:\Users\Public\Desktop\Norton 360.lnk
2013-02-28 05:05 - 2012-02-07 14:07 - 00002066 ____A C:\ProgramData\Desktop\Norton 360.lnk


==================== Known DLLs (Whitelisted) =================


==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys
[2012-12-12 11:38] - [2012-08-21 03:47] - 0224640 ____A (Microsoft Corporation) 786DB5771F05EF300390399F626BF30A


==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================


==================== Memory info ===========================

Percentage of memory in use: 14%
Total physical RAM: 1917.88 MB
Available physical RAM: 1632.34 MB
Total Pagefile: 1853.66 MB
Available Pagefile: 1715.85 MB
Total Virtual: 2047.88 MB
Available Virtual: 1975.51 MB

==================== Partitions =============================

1 Drive c: (DRIVE_C) (Fixed) (Total:455.94 GB) (Free:356.05 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
7 Drive i: (MUSHKIN) (Removable) (Total:14.91 GB) (Free:1.97 GB) NTFS
8 Drive r: (MS-RAMDRIVE) (Fixed) (Total:0.01 GB) (Free:0.01 GB) FAT
9 Drive x: (RECOVERY) (Fixed) (Total:9.82 GB) (Free:3.09 GB) NTFS

  Disk ###  Status      Size     Free     Dyn  Gpt
  --------  ----------  -------  -------  ---  ---
  Disk 0    Online       466 GB      0 B         
  Disk 1    No Media        0 B      0 B         
  Disk 2    No Media        0 B      0 B         
  Disk 3    No Media        0 B      0 B         
  Disk 4    No Media        0 B      0 B         
  Disk 5    Online        15 GB      0 B         

Partitions of Disk 0:
===============

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary             10 GB    32 KB
  Partition 2    Primary            456 GB    10 GB

=========================================================

Disk: 0
Partition 1
Type  : 07
Hidden: No
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 4     X   RECOVERY     NTFS   Partition     10 GB  Healthy    Boot    

=========================================================

Disk: 0
Partition 2
Type  : 07
Hidden: No
Active: Yes

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 7     C   DRIVE_C      NTFS   Partition    456 GB  Healthy            

=========================================================

Partitions of Disk 5:
===============

  Partition ###  Type              Size     Offset
  -------------  ----------------  -------  -------
  Partition 1    Primary             15 GB  4032 KB

=========================================================

Disk: 5
Partition 1
Type  : 07
Hidden: No
Active: No

  Volume ###  Ltr  Label        Fs     Type        Size     Status     Info
  ----------  ---  -----------  -----  ----------  -------  ---------  --------
* Volume 7     I   MUSHKIN      NTFS   Removable     15 GB  Healthy            

=========================================================
============================== MBR Partition Table ==================

==============================
Partitions of Disk 0:
===============
Disk ID: 6A4CA4CD

Partition 1:
=========
Hex: 0001010007FEFFFF3F00000043423A01
Active: NO
Type: 07 (NTFS)
Size: 10 GB

Partition 2:
=========
Hex: 80FEFFFF07FEFFFF82423A01AE15FE38
Active: YES
Type: 07 (NTFS)
Size: 456 GB

==============================
Partitions of Disk 5:
===============
Disk ID: C3072E18

Partition 1:
=========
Hex: 00000101074DCE25801F00008020DD01
Active: NO
Type: 07 (NTFS)
Size: 15 GB


Last Boot: 2013-03-29 19:45

==================== End Of Log ============================

 

Search.txt Report

Farbar Recovery Scan Tool (x86) Version: 13-03-2013
Ran by SYSTEM at 2013-03-30 00:43:39
Running from I:\

================== Search: "services.exe" ===================

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6002.18005_none_d14b3973ca6acc56\services.exe
[2009-07-30 06:41] - [2009-04-10 22:27] - 0279552 ____A (Microsoft Corporation) D4E6D91C1349B7BFB3599A6ADA56851B

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6001.18000_none_cf5fc067cd49010a\services.exe
[2008-10-23 15:29] - [2008-01-18 19:33] - 0279040 ____A (Microsoft Corporation) 2B336AB6286D6C81FA02CBAB914E3C6C

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6000.16386_none_cd28fe6bd05df036\services.exe
[2006-11-02 00:35] - [2006-11-02 01:45] - 0279552 ____A (Microsoft Corporation) 329CF3C97CE4C19375C8ABCABAE258B0

C:\Windows\System32\services.exe
[2009-07-30 06:41] - [2009-04-10 22:27] - 0279552 ____A (Microsoft Corporation) D4E6D91C1349B7BFB3599A6ADA56851B

=== End Of Search ===

 

Thanks!



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:56 AM

Posted 30 March 2013 - 12:10 AM



Hello ClearFocus



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt
 
HKLM\...\Run: [SearchProtectAll] C:\Program Files\SearchProtect\bin\cltmng.exe [2731296 2013-03-06] (Conduit)
HKLM\...\Run: [DATAMNGR] C:\PROGRA~1\SETTIN~1\Datamngr\DATAMN~1.EXE [1684016 2013-02-05] (Koyote-Lab, inc)
HKU\Best Buy\...\Run: [SearchProtect] C:\Users\Best Buy\AppData\Roaming\SearchProtect\bin\cltmng.exe [2731296 2013-03-06] (Conduit)
HKU\Best Buy\...\Run: [Yontoo Desktop] "C:\Users\Best Buy\AppData\Roaming\Yontoo\YontooDesktop.exe" [42784 2013-03-22] (Yontoo LLC)
HKU\Best Buy\...\Winlogon: [Shell] explorer.exe,C:\Users\Best Buy\AppData\Roaming\skype.dat [86528 2013-03-24] ()
C:\Users\Best Buy\AppData\Roaming\skype.dat
C:\Users\Best Buy\Application Data\skype.ini
C:\Users\Best Buy\AppData\Roaming\skype.ini
C:\Users\Best Buy\Application Data\Yontoo
C:\Users\Best Buy\AppData\Roaming\Yontoo
C:\Windows\Tasks\SCHEDLGU.TXT
C:\Windows\Tasks\SA.DAT
C:\Users\Best Buy\Application Data\skype.dat
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 ClearFocus

ClearFocus
  • Topic Starter

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 30 March 2013 - 12:16 AM

Hi Gringo,

 

Here is the Fixlog.txt log file ....

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 13-03-2013
Ran by SYSTEM at 2013-03-30 01:13:57 Run:1
Running from I:\

==============================================

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\SearchProtectAll Value deleted successfully.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\DATAMNGR Value deleted successfully.
HKEY_USERS\Best Buy\Software\Microsoft\Windows\CurrentVersion\Run\\SearchProtect Value deleted successfully.
HKEY_USERS\Best Buy\Software\Microsoft\Windows\CurrentVersion\Run\\Yontoo Desktop Value deleted successfully.
HKEY_USERS\Best Buy\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell Value deleted successfully.
C:\Users\Best Buy\AppData\Roaming\skype.dat moved successfully.
C:\Users\Best Buy\Application Data\skype.ini moved successfully.
C:\Users\Best Buy\AppData\Roaming\skype.ini not found.
C:\Users\Best Buy\Application Data\Yontoo moved successfully.
C:\Users\Best Buy\AppData\Roaming\Yontoo not found.
C:\Windows\Tasks\SCHEDLGU.TXT moved successfully.
C:\Windows\Tasks\SA.DAT moved successfully.
C:\Users\Best Buy\Application Data\skype.dat not found.

==== End of Fixlog ====

 

 

 

Started in Normal Mode and at first glance it appears MoneyPack is no longer present.  Outside of running some normal scans via Norton, MBAM, and SAS, do you feel there are any specialty scans that should be run at this point or from the past logs, was the FBI Moneypak the only infection?

 

Many thanks!



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:56 AM

Posted 30 March 2013 - 12:32 AM


Hello ClearFocus

I see allot of what you would call junkware that I am going to clean out

These are the programs I would like you to run next, if you have any problems with these just skip it and move on to the next one.


-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
  • Gringo





I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 ClearFocus

ClearFocus
  • Topic Starter

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 01 April 2013 - 11:11 AM

Hi Gringo,

 

Here are the two logs ....

 

AdwCleaner

 

# AdwCleaner v2.115 - Logfile created 04/01/2013 at 11:58:03
# Updated 17/03/2013 by Xplode
# Operating system : Windows Vista ™ Home Premium Service Pack 2 (32 bits)
# User : Best Buy - AR67CL65SZJ
# Boot Mode : Normal
# Running from : C:\Users\Best Buy\Downloads\AdwCleaner.exe
# Option [Delete]


***** [Services] *****

Stopped & Deleted : CltMngSvc
Stopped & Deleted : WajamUpdater
Stopped & Deleted : Yontoo Desktop Updater

***** [Files / Folders] *****

File Deleted : C:\END
Folder Deleted : C:\Program Files\Babylon
Folder Deleted : C:\Program Files\Conduit
Folder Deleted : C:\Program Files\Free Offers from Freeze.com
Folder Deleted : C:\Program Files\Produtools_Manuals_2.1_B
Folder Deleted : C:\Program Files\SearchProtect
Folder Deleted : C:\Program Files\TotalRecipeSearch_14EI
Folder Deleted : C:\Program Files\Trymedia
Folder Deleted : C:\Program Files\Wajam
Folder Deleted : C:\Program Files\Yontoo
Folder Deleted : C:\ProgramData\Tarma Installer
Folder Deleted : C:\Users\Best Buy\AppData\Local\Conduit
Folder Deleted : C:\Users\Best Buy\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\Best Buy\AppData\LocalLow\CouponAlert_2p
Folder Deleted : C:\Users\Best Buy\AppData\LocalLow\GamingWonderland
Folder Deleted : C:\Users\Best Buy\AppData\LocalLow\PriceGong
Folder Deleted : C:\Users\Best Buy\AppData\LocalLow\Produtools_Manuals_2.1_B
Folder Deleted : C:\Users\Best Buy\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Wajam
Folder Deleted : C:\Users\Best Buy\AppData\Roaming\SearchProtect

***** [Registry] *****

Data Deleted : HKLM\..\Windows [AppInit_DLLs] = C:\PROGRA~1\SETTIN~1\Datamngr\datamngr.dll
Data Deleted : HKLM\..\Windows [AppInit_DLLs] = C:\PROGRA~1\SETTIN~1\Datamngr\IEBHO.dll
Key Deleted : HKCU\Software\APN PIP
Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Key Deleted : HKCU\Software\AppDataLow\Software\Crossrider
Key Deleted : HKCU\Software\AppDataLow\Software\Freecause
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\Produtools_Manuals_2.1_B
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKCU\Software\AppDataLow\Software\Toolbar
Key Deleted : HKCU\Software\AppDataLow\Toolbar
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\Cr_Installer
Key Deleted : HKCU\Software\DataMngr
Key Deleted : HKCU\Software\DataMngr_Toolbar
Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{09971CEE-01B8-42BC-9D91-456B1FAAD6BE}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{1CB20BF0-BBAE-40A7-93F4-6435FF3D0411}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\CToolbar_UNINSTALL
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Produtools_Manuals_2.1_B Toolbar
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\SearchProtect
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Wajam
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A7A6995D-6EE1-4FD1-A258-49395D5BF99C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{F2D6C718-7E52-428E-8852-365C4B1A6E36}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{23B38049-323F-443D-9732-F454E5B15B72}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6C1B9042-3D32-49A1-916B-0AA3A9CDDFD6}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6D11A023-8534-48A3-B850-A1AE71580E46}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{8736C681-37A0-40C6-A0F0-4C083409151C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{A7A6995D-6EE1-4FD1-A258-49395D5BF99C}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F2D6C718-7E52-428E-8852-365C4B1A6E36}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FD79F359-E577-46DB-AA74-D6E6B8B45BA8}
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKCU\Software\Wajam
Key Deleted : HKCU\Software\Zugo
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1FAEE6D5-34F4-42AA-8025-3FD8F3EC4634}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{D616A4A2-7B38-4DBC-9093-6FE7A4A21B17}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{D97A8234-F2A2-4AD4-91D5-FECDB2C553AF}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\BrowserConnection.dll
Key Deleted : HKLM\SOFTWARE\Classes\AppID\priam_bho.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\YontooIEClient.DLL
Key Deleted : HKLM\SOFTWARE\Classes\BrowserConnection.Loader
Key Deleted : HKLM\SOFTWARE\Classes\BrowserConnection.Loader.1
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{431532BD-0AE1-4ABC-BE8C-919F3D1332E2}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{5D64294B-1341-4FE7-B6D8-7C36828D4DD5}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6D11A023-8534-48A3-B850-A1AE71580E46}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A7A6995D-6EE1-4FD1-A258-49395D5BF99C}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F2D6C718-7E52-428E-8852-365C4B1A6E36}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FD79F359-E577-46DB-AA74-D6E6B8B45BA8}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FE9271F2-6EFD-44B0-A826-84C829536E93}
Key Deleted : HKLM\SOFTWARE\Classes\iLividIEHelper.DNSGuard
Key Deleted : HKLM\SOFTWARE\Classes\iLividIEHelper.DNSGuard.1
Key Deleted : HKLM\SOFTWARE\Classes\IMsiDe1egate.Application.1
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3B181CF2-878B-4758-8FBD-59D8AC5AB12D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{431532BD-0AE1-4ABC-BE8C-919F3D1332E2}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{490A5A0F-1471-47FF-8BB5-719F1F5238AD}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{58E64AEE-516A-4DFC-AC38-31C50E8AF0F1}
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3239904
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3282146
Key Deleted : HKLM\SOFTWARE\Classes\TotalRecipeSearch_14Installer.Start
Key Deleted : HKLM\SOFTWARE\Classes\TotalRecipeSearch_14Installer.Start.1
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{095BFD3C-4602-4FE1-96F1-AEFAFBFD067D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{8E5B29C2-BC6E-40BE-B881-AEE35B1F4035}
Key Deleted : HKLM\SOFTWARE\Classes\wajam.WajamBHO
Key Deleted : HKLM\SOFTWARE\Classes\wajam.WajamBHO.1
Key Deleted : HKLM\SOFTWARE\Classes\wajam.WajamDownloader
Key Deleted : HKLM\SOFTWARE\Classes\wajam.WajamDownloader.1
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\DataMngr
Key Deleted : HKLM\Software\Freeze.com
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\dhkplhfnhceodhffomolpfigojocbpcb
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\niapdbllcanepiiimjjndipklodoedlc
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{16FE2505-F2A0-4782-B035-AF0E5188C02C}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{32EC48C2-803E-4180-AD50-A703597D5089}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{56965DCF-718F-4148-BECF-5A2B466F4556}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A4D62294-AB76-46EC-91E5-01F527ABB714}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{09971CEE-01B8-42BC-9D91-456B1FAAD6BE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{AFDBDDAA-5D3F-42EE-B79C-185A7020515B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{A7A6995D-6EE1-4FD1-A258-49395D5BF99C}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F2D6C718-7E52-428E-8852-365C4B1A6E36}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{6C1B9042-3D32-49A1-916B-0AA3A9CDDFD6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{6D11A023-8534-48A3-B850-A1AE71580E46}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{8867AC9B-4426-44A2-A693-C95850D3405C}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{FD79F359-E577-46DB-AA74-D6E6B8B45BA8}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Produtools_Manuals_2.1_B Toolbar
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SearchProtect
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Wajam
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@ei.TotalRecipeSearch_14.com/Plugin
Key Deleted : HKLM\Software\PIP
Key Deleted : HKLM\Software\Produtools_Manuals_2.1_B
Key Deleted : HKLM\Software\SearchProtect
Key Deleted : HKLM\Software\Tarma Installer
Key Deleted : HKLM\Software\TotalRecipeSearch_14EI
Key Deleted : HKLM\Software\Wajam
Key Deleted : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\WajamUpdater
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{D3D233D5-9F6D-436C-B6C7-E63F77503B30}]
Value Deleted : HKCU\Software\Mozilla\Firefox\Extensions [{5a95a9e0-59dd-4314-bd84-4d18ca83a0e2}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\New Windows\Allow [*.crossrider.com]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [10]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks [{6C3D3BD4-75F8-4283-BB97-1E22C4C090DF}]

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16470

Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Search Bar] = hxxp://toolbar.inbox.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=%tb_id&%language --> hxxp://www.google.com
Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\Search - SearchAssistant] = hxxp://toolbar.inbox.com/search/ie.aspx?tbid=80110&lng=en --> hxxp://www.google.com
Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\Search - CustomizeSearch] = hxxp://toolbar.inbox.com/help/sa_customize.aspx?tbid=80110 --> hxxp://www.google.com
Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\Main - SearchAssistant] = hxxp://toolbar.inbox.com/search/ie.aspx?tbid=80110&lng=en --> hxxp://www.google.com
Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\Main - CustomizeSearch] = hxxp://toolbar.inbox.com/help/sa_customize.aspx?tbid=80110 --> hxxp://www.google.com

*************************

AdwCleaner[S1].txt - [13479 octets] - [01/04/2013 11:58:03]

########## EOF - C:\AdwCleaner[S1].txt - [13540 octets] ##########

 

 

RogueKiller

 

RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : Best Buy [Admin rights]
Mode : Remove -- Date : 04/01/2013 12:06:34
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 6 ¤¤¤
[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031A47-3F72-44A7-89C5-5595FE6B30EE} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\NewStartPanel : {59031A47-3F72-44A7-89C5-5595FE6B30EE} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\NewStartPanel : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[13] : NtAlertResumeThread @ 0x82A9D5E9 -> HOOKED (Unknown @ 0x871DE0E8)
SSDT[14] : NtAlertThread @ 0x829D3344 -> HOOKED (Unknown @ 0x871DE1C8)
SSDT[18] : NtAllocateVirtualMemory @ 0x82A09ED4 -> HOOKED (Unknown @ 0x871DEB40)
SSDT[21] : NtAlpcConnectPort @ 0x829D5419 -> HOOKED (Unknown @ 0x870B2178)
SSDT[42] : NtAssignProcessToJobObject @ 0x829E5C76 -> HOOKED (Unknown @ 0x871E0838)
SSDT[67] : NtCreateMutant @ 0x82A2F8F9 -> HOOKED (Unknown @ 0x871E0DE0)
SSDT[77] : NtCreateSymbolicLinkObject @ 0x829D38EE -> HOOKED (Unknown @ 0x871E0558)
SSDT[78] : NtCreateThread @ 0x82A9BBE4 -> HOOKED (Unknown @ 0x871DCB68)
SSDT[116] : NtDebugActiveProcess @ 0x82A6FA28 -> HOOKED (Unknown @ 0x871E0918)
SSDT[129] : NtDuplicateObject @ 0x82A2F00B -> HOOKED (Unknown @ 0x871DC8B0)
SSDT[147] : NtFreeVirtualMemory @ 0x82892641 -> HOOKED (Unknown @ 0x871DE8F8)
SSDT[156] : NtImpersonateAnonymousToken @ 0x829CCD8E -> HOOKED (Unknown @ 0x871E0ED0)
SSDT[158] : NtImpersonateThread @ 0x82A45A6D -> HOOKED (Unknown @ 0x871E0F90)
SSDT[165] : NtLoadDriver @ 0x829773A6 -> HOOKED (Unknown @ 0x870B20E0)
SSDT[177] : NtMapViewOfSection @ 0x82A1CD29 -> HOOKED (Unknown @ 0x871DE7F8)
SSDT[184] : NtOpenEvent @ 0x829C56A8 -> HOOKED (Unknown @ 0x871E0D00)
SSDT[194] : NtOpenProcess @ 0x829DB902 -> HOOKED (Unknown @ 0x871DCA50)
SSDT[195] : NtOpenProcessToken @ 0x82A29F6F -> HOOKED (Unknown @ 0x871DC7D0)
SSDT[197] : NtOpenSection @ 0x82A365B5 -> HOOKED (Unknown @ 0x871E0B40)
SSDT[201] : NtOpenThread @ 0x82A30799 -> HOOKED (Unknown @ 0x871DC980)
SSDT[210] : NtProtectVirtualMemory @ 0x82A0F892 -> HOOKED (Unknown @ 0x871E0748)
SSDT[282] : NtResumeThread @ 0x82A2ADB0 -> HOOKED (Unknown @ 0x871DE2A8)
SSDT[289] : NtSetContextThread @ 0x82A9D097 -> HOOKED (Unknown @ 0x871DE548)
SSDT[305] : NtSetInformationProcess @ 0x82A27E2E -> HOOKED (Unknown @ 0x871DE628)
SSDT[317] : NtSetSystemInformation @ 0x829C7364 -> HOOKED (Unknown @ 0x871E09F8)
SSDT[330] : NtSuspendProcess @ 0x82A9D523 -> HOOKED (Unknown @ 0x871E0C20)
SSDT[331] : NtSuspendThread @ 0x82A54896 -> HOOKED (Unknown @ 0x871DE388)
SSDT[335] : unknown @ 0x829DB44B -> HOOKED (Unknown @ 0x871DE468)
SSDT[348] : NtUnmapViewOfSection @ 0x82A1C9A0 -> HOOKED (Unknown @ 0x871DE718)
SSDT[358] : NtWriteVirtualMemory @ 0x82A116A8 -> HOOKED (Unknown @ 0x871DE9E8)
SSDT[382] : NtCreateThreadEx @ 0x829DAE44 -> HOOKED (Unknown @ 0x871E0648)
S_SSDT[317] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x8798A808)
S_SSDT[397] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x8798A3F8)
S_SSDT[428] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x87994450)
S_SSDT[430] : NtUserGetKeyState -> HOOKED (Unknown @ 0x879DB648)
S_SSDT[442] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x878A5630)
S_SSDT[479] : NtUserMessageCall -> HOOKED (Unknown @ 0x8792A928)
S_SSDT[497] : NtUserPostMessage -> HOOKED (Unknown @ 0x87994380)
S_SSDT[498] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x8792A9F8)
S_SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x87A0C7C0)
S_SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x8798A538)

¤¤¤ Extern Hives: ¤¤¤
-> D:\windows\system32\config\SOFTWARE
-> D:\windows\system32\config\SYSTEM
-> D:\Users\Default\NTUSER.DAT

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1       localhost
::1             localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: WDC WD50 00AAKS-22TMA SCSI Disk Device +++++
--- User ---
[MBR] f1f713dcb65f5b56e74881133bfcf733
[BSP] ed7b67af5ff90034792084f27a7bfc6b : Windows Vista MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 10056 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 20595330 | Size: 466882 Mo
User = LL1 ... OK!
Error reading LL2 MBR!

Finished : << RKreport[2]_D_04012013_02d1206.txt >>
RKreport[1]_S_04012013_02d1205.txt ; RKreport[2]_D_04012013_02d1206.txt



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:56 AM

Posted 01 April 2013 - 04:52 PM


Hello ClearFocus

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

  • Gringo




I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 ClearFocus

ClearFocus
  • Topic Starter

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 01 April 2013 - 05:59 PM

Gringo,

 

The computer appears to be running much better with no obvious signs of any lasting issues.

 

Here's the log file ...

 

ComboFix 13-04-01.01 - Best Buy 04/01/2013  18:47:24.1.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.1918.1190 [GMT -4:00]
Running from: c:\users\Best Buy\Downloads\ComboFix.exe
AV: Norton 360 *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
FW: Norton 360 *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
SP: Norton 360 *Disabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
C:\dfinstall.log
c:\program files\CouponAlert_2pEI
c:\programdata\ntuser.dat
c:\programdata\windows
c:\windows\system32\URTTemp
c:\windows\system32\URTTemp\regtlib.exe
c:\windows\Update.bat
D:\Autorun.inf
.
.
(((((((((((((((((((((((((   Files Created from 2013-03-01 to 2013-04-01  )))))))))))))))))))))))))))))))
.
.
2013-04-01 22:33 . 2013-04-01 22:33 9310 ----a-w- c:\programdata\Microsoft\IdentityCRL\production\temp\wlidui_WLIDSVC\TEXTBOX.JS
2013-03-30 08:41 . 2013-03-30 08:41 -------- d-----w- C:\FRST
2013-03-30 05:27 . 2013-03-30 05:27 -------- d-----w- c:\users\Best Buy\AppData\Roaming\SUPERAntiSpyware.com
2013-03-30 05:25 . 2013-03-30 05:27 -------- d-----w- c:\program files\SUPERAntiSpyware
2013-03-30 05:25 . 2013-03-30 05:25 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2013-03-30 05:20 . 2013-03-30 05:21 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2013-03-30 05:20 . 2012-12-14 20:49 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-03-30 05:20 . 2013-03-30 05:20 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2013-03-24 12:30 . 2013-03-24 12:30 -------- d-----w- c:\program files\FGIcon
2013-03-24 12:30 . 2013-03-24 12:30 -------- d-----w- c:\programdata\Wincert
2013-03-24 12:29 . 2013-03-24 12:30 -------- d-----w- c:\program files\Settings Alerter
2013-03-14 21:36 . 2013-03-06 10:38 770384 ----a-w- c:\windows\system32\msvcr100.dll
2013-03-14 21:36 . 2013-03-06 10:38 421200 ----a-w- c:\windows\system32\msvcp100.dll
2013-03-09 20:17 . 2013-03-09 20:17 94112 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-12 20:25 . 2012-07-06 22:33 693976 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-03-12 20:25 . 2011-06-09 18:06 73432 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-03-09 20:17 . 2012-07-07 00:01 861088 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-03-09 20:17 . 2010-05-23 19:23 782240 ----a-w- c:\windows\system32\deployJava1.dll
2013-02-07 00:15 . 2012-02-07 22:07 142496 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2013-01-31 03:18 . 2013-02-27 14:04 350368 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symtdiv.sys
2013-01-31 03:18 . 2013-02-27 14:04 338592 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symnets.sys
2013-01-31 03:18 . 2013-02-27 14:04 934488 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symefa.sys
2013-01-29 01:45 . 2013-02-27 14:04 602712 ----a-w- c:\windows\system32\drivers\N360\1403000.024\srtsp.sys
2013-01-29 01:45 . 2013-02-27 14:04 32344 ----a-w- c:\windows\system32\drivers\N360\1403000.024\srtspx.sys
2013-01-22 02:15 . 2013-02-27 14:04 367704 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symds.sys
2013-01-05 05:26 . 2013-02-13 15:06 3602808 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-05 05:26 . 2013-02-13 15:06 3550072 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-04 11:28 . 2013-02-13 15:06 905576 ----a-w- c:\windows\system32\drivers\tcpip.sys
2013-01-04 01:38 . 2013-02-13 15:06 2048512 ----a-w- c:\windows\system32\win32k.sys
2007-10-19 22:20 . 2007-10-19 22:20 774144 ----a-w- c:\program files\RngInterstitial.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-09-06 4780928]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="RtHDVCpl.exe" [2007-01-18 4349952]
"CHotkey"="zHotkey.exe" [2006-11-07 547840]
"ShowWnd"="ShowWnd.exe" [2005-01-27 36864]
"ModPS2"="ModPS2Key.exe" [2006-11-07 53248]
"amd_dc_opt"="c:\program files\AMD\Dual-Core Optimizer\amd_dc_opt.exe" [2006-11-17 77824]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-06-20 13535776]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-06-20 92704]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2011-10-24 421888]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Launcher"="c:\windows\SMINST\launcher.exe" [2007-04-17 40072]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
R4 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [x]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2013-04-01 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-07-06 20:25]
.
2013-04-01 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-06-22 23:10]
.
2013-04-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-06-22 23:10]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://insightbb.com/
mStart Page = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&Br=GTW&Loc=ENG_US&Sys=DTP&M=GM5472
uInternet Settings,ProxyOverride = <local>;*.local
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
URLSearchHooks-{313a832a-aaf3-4880-a8d0-c42bee319c02} - (no file)
URLSearchHooks-{ffb11c0c-da90-4969-a995-8dca2e0fc10a} - (no file)
URLSearchHooks-{81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - (no file)
URLSearchHooks-{57e11d25-85f5-47e0-b044-cd2580fbac32} - (no file)
WebBrowser-{57E11D25-85F5-47E0-B044-CD2580FBAC32} - (no file)
Notify-DfLogon - LogonDll.dll
SafeBoot-WudfPf
SafeBoot-WudfRd
AddRemove-Octoshape add-in for Adobe Flash Player - c:\users\Best Buy\AppData\Roaming\Macromedia\Flash Player\www.macromedia.com\bin\octoshape\octoshape.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-04-01 18:55
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\N360]
"ImagePath"="\"c:\program files\Norton 360\Engine\20.3.0.36\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\20.3.0.36\diMaster.dll\" /prefetch:1"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3145862903-2119528392-1372316911-1000\*& [*t*]
@Allowed: (Read) (RestrictedCode)
"MachineID"=hex:63,cc,a2,65,72,10,8f,00
.
[HKEY_USERS\S-1-5-21-3145862903-2119528392-1372316911-1000\Software\SecuROM\License information*]
"datasecu"=hex:59,68,bc,c6,52,a4,bf,b9,54,69,6e,da,28,a3,01,29,e6,f3,84,87,78,
   b8,32,0c,51,83,34,de,4e,d9,db,d7,ac,ae,a6,30,16,29,89,2b,52,4c,cb,1a,dc,e4,\
"rkeysecu"=hex:f4,e9,7d,99,32,4c,3b,eb,cf,f8,ed,f1,a9,e2,05,61
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\Default_Monitor\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\Default_Monitor\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY06AF\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY06AF\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY08A4\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY08A4\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\PTW0309\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\PTW0309\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
Completion time: 2013-04-01  18:56:42
ComboFix-quarantined-files.txt  2013-04-01 22:56
.
Pre-Run: 377,442,074,624 bytes free
Post-Run: 377,578,098,688 bytes free
.
- - End Of File - - 0F6C006EA6B84A5B147348E30A982BB3
 



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:56 AM

Posted 01 April 2013 - 06:26 PM


Hello ClearFocus

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:
 ClearJavaCache:: 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 ClearFocus

ClearFocus
  • Topic Starter

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 01 April 2013 - 07:40 PM

Gringo,

 

Everything looks good.  Here is the log ...

 

ComboFix 13-04-01.01 - Best Buy 04/01/2013  20:24:10.2.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.1918.658 [GMT -4:00]
Running from: c:\users\Best Buy\Downloads\ComboFix.exe
Command switches used :: c:\users\Best Buy\Desktop\cfscript.txt
AV: Norton 360 *Enabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}
FW: Norton 360 *Enabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}
SP: Norton 360 *Enabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
Infected copy of c:\windows\system32\user32.dll was found and disinfected
Restored copy from - c:\windows\erdnt\cache\user32.dll
.
.
(((((((((((((((((((((((((   Files Created from 2013-03-02 to 2013-04-02  )))))))))))))))))))))))))))))))
.
.
2013-04-02 00:32 . 2013-04-02 00:34 -------- d-----w- c:\users\Best Buy\AppData\Local\temp
2013-04-02 00:32 . 2013-04-02 00:32 -------- d-----w- c:\users\Experience\AppData\Local\temp
2013-04-02 00:32 . 2013-04-02 00:32 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-04-01 23:03 . 2013-04-01 23:03 -------- d-----w- c:\users\Best Buy\AppData\Roaming\Auslogics
2013-04-01 23:03 . 2013-04-01 23:03 -------- d-----w- c:\program files\Auslogics
2013-04-01 23:01 . 2013-04-01 23:01 -------- d-----w- c:\program files\CleanUp!
2013-04-01 23:00 . 2013-04-01 23:00 -------- d-----w- c:\program files\CCleaner
2013-03-30 08:41 . 2013-03-30 08:41 -------- d-----w- C:\FRST
2013-03-30 05:27 . 2013-03-30 05:27 -------- d-----w- c:\users\Best Buy\AppData\Roaming\SUPERAntiSpyware.com
2013-03-30 05:25 . 2013-03-30 05:27 -------- d-----w- c:\program files\SUPERAntiSpyware
2013-03-30 05:25 . 2013-03-30 05:25 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2013-03-30 05:20 . 2013-03-30 05:21 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2013-03-30 05:20 . 2012-12-14 20:49 21104 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-03-30 05:20 . 2013-03-30 05:20 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2013-03-24 12:30 . 2013-03-24 12:30 -------- d-----w- c:\program files\FGIcon
2013-03-24 12:30 . 2013-03-24 12:30 -------- d-----w- c:\programdata\Wincert
2013-03-24 12:29 . 2013-03-24 12:30 -------- d-----w- c:\program files\Settings Alerter
2013-03-14 21:36 . 2013-03-06 10:38 770384 ----a-w- c:\windows\system32\msvcr100.dll
2013-03-14 21:36 . 2013-03-06 10:38 421200 ----a-w- c:\windows\system32\msvcp100.dll
2013-03-09 20:17 . 2013-03-09 20:17 94112 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-12 20:25 . 2012-07-06 22:33 693976 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-03-12 20:25 . 2011-06-09 18:06 73432 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-03-09 20:17 . 2012-07-07 00:01 861088 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-03-09 20:17 . 2010-05-23 19:23 782240 ----a-w- c:\windows\system32\deployJava1.dll
2013-02-07 00:15 . 2012-02-07 22:07 142496 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2013-01-31 03:18 . 2013-02-27 14:04 350368 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symtdiv.sys
2013-01-31 03:18 . 2013-02-27 14:04 338592 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symnets.sys
2013-01-31 03:18 . 2013-02-27 14:04 934488 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symefa.sys
2013-01-29 01:45 . 2013-02-27 14:04 602712 ----a-w- c:\windows\system32\drivers\N360\1403000.024\srtsp.sys
2013-01-29 01:45 . 2013-02-27 14:04 32344 ----a-w- c:\windows\system32\drivers\N360\1403000.024\srtspx.sys
2013-01-22 02:15 . 2013-02-27 14:04 367704 ----a-w- c:\windows\system32\drivers\N360\1403000.024\symds.sys
2013-01-05 05:26 . 2013-02-13 15:06 3602808 ----a-w- c:\windows\system32\ntkrnlpa.exe
2013-01-05 05:26 . 2013-02-13 15:06 3550072 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-01-04 11:28 . 2013-02-13 15:06 905576 ----a-w- c:\windows\system32\drivers\tcpip.sys
2013-01-04 01:38 . 2013-02-13 15:06 2048512 ----a-w- c:\windows\system32\win32k.sys
2007-10-19 22:20 . 2007-10-19 22:20 774144 ----a-w- c:\program files\RngInterstitial.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-19 125952]
"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-19 202240]
"SUPERAntiSpyware"="c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe" [2012-09-06 4780928]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="RtHDVCpl.exe" [2007-01-18 4349952]
"CHotkey"="zHotkey.exe" [2006-11-07 547840]
"ShowWnd"="ShowWnd.exe" [2005-01-27 36864]
"ModPS2"="ModPS2Key.exe" [2006-11-07 53248]
"amd_dc_opt"="c:\program files\AMD\Dual-Core Optimizer\amd_dc_opt.exe" [2006-11-17 77824]
"NvCplDaemon"="c:\windows\system32\NvCpl.dll" [2008-06-20 13535776]
"NvMediaCenter"="c:\windows\system32\NvMcTray.dll" [2008-06-20 92704]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2011-09-27 59240]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2011-10-24 421888]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-03 946352]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce]
"Launcher"="c:\windows\SMINST\launcher.exe" [2007-04-17 40072]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE [2001-2-13 83360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-07-19 113024]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]
"DisableMonitoring"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]
"DisableMonitoring"=dword:00000001
.
R4 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [x]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2013-04-01 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-07-06 20:25]
.
2013-04-02 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-06-22 23:10]
.
2013-04-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2010-06-22 23:10]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://insightbb.com/
mStart Page = hxxp://www.gateway.com/g/startpage.html?Ch=Retail&Br=GTW&Loc=ENG_US&Sys=DTP&M=GM5472
uInternet Settings,ProxyOverride = <local>;*.local
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office10\EXCEL.EXE/3000
TCP: DhcpNameServer = 192.168.1.1
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-04-01 20:34
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\N360]
"ImagePath"="\"c:\program files\Norton 360\Engine\20.3.0.36\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\20.3.0.36\diMaster.dll\" /prefetch:1"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-3145862903-2119528392-1372316911-1000\*& [*t*]
@Allowed: (Read) (RestrictedCode)
"MachineID"=hex:63,cc,a2,65,72,10,8f,00
.
[HKEY_USERS\S-1-5-21-3145862903-2119528392-1372316911-1000\Software\SecuROM\License information*]
"datasecu"=hex:59,68,bc,c6,52,a4,bf,b9,54,69,6e,da,28,a3,01,29,e6,f3,84,87,78,
   b8,32,0c,51,83,34,de,4e,d9,db,d7,ac,ae,a6,30,16,29,89,2b,52,4c,cb,1a,dc,e4,\
"rkeysecu"=hex:f4,e9,7d,99,32,4c,3b,eb,cf,f8,ed,f1,a9,e2,05,61
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\Default_Monitor\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\Default_Monitor\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY06AF\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY06AF\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY08A4\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\GWY08A4\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\PTW0309\4&2995a141&0&UID256\Properties\{83da6326-97a6-4088-9453-a1923f573b29}]
@DACL=(02 0000)
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\DISPLAY\PTW0309\4&2995a141&0&UID256\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}]
@DACL=(02 0000)
.
------------------------ Other Running Processes ------------------------
.
c:\windows\system32\nvvsvc.exe
c:\windows\system32\rundll32.exe
c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe
c:\windows\system32\agrsmsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\program files\Norton 360\Engine\20.3.0.36\ccSvcHst.exe
c:\windows\system32\PnkBstrA.exe
c:\windows\system32\PnkBstrB.exe
c:\program files\Norton 360\Engine\20.3.0.36\ccSvcHst.exe
c:\program files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
c:\program files\Common Files\Authentium\AntiVirus5\vsedsps.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
c:\program files\Common Files\Authentium\AntiVirus5\vseamps.exe
c:\program files\Common Files\Authentium\AntiVirus5\vseqrts.exe
c:\windows\System32\WUDFHost.exe
c:\program files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\windows\system32\DllHost.exe
.
**************************************************************************
.
Completion time: 2013-04-01  20:38:39 - machine was rebooted
ComboFix-quarantined-files.txt  2013-04-02 00:38
ComboFix2.txt  2013-04-01 22:56
.
Pre-Run: 378,366,472,192 bytes free
Post-Run: 379,004,149,760 bytes free
.
- - End Of File - - 07DCCFAA66B084C89AB30659D7179303
 



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:56 AM

Posted 01 April 2013 - 07:56 PM


Hello ClearFocus

I would like to see a report that combofix makes.

extra combofix report
C:\Qoobox\Add-Remove Programs.txt
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box
    • click ok
  • copy and paste the report into this topic for me to review

    Gringo



I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 ClearFocus

ClearFocus
  • Topic Starter

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 01 April 2013 - 07:58 PM

Gringo,

 

Here  you go ...

 

20-20 Version 8.1
Adobe Flash Player 11 ActiveX
Adobe Reader X (10.1.6)
Adobe Shockwave Player 11.6
Agere Systems PCI-SV92PP Soft Modem
Apple Application Support
Apple Mobile Device Support
Apple Software Update
Auslogics Disk Defrag
AVerMedia M791 PCIe Combo NTSC/ATSC 6.104.0.5
AVSDK5
Bonjour
CCleaner
Choice Guard
CleanUp!
Client Activator 2.0 - English
Compatibility Pack for the 2007 Office system
Digital Media Reader
Dual-Core Optimizer
Gateway Download Assistant
Gateway Drivers and Applications Recovery
Gateway Recovery Center Installer
GearDrvs
Google Earth
Google Update Helper
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)
Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)
HP Product Detection
IrfanView (remove only)
Java 7 Update 17
Java Auto Updater
Java™ 6 Update 31
Java™ 6 Update 6
Java™ 6 Update 7
Java™ SE Runtime Environment 6 Update 1
JavaFX 2.1.1
Juniper Networks Secure Application Manager
Juniper Networks Setup Client
Malwarebytes Anti-Malware version 1.70.0.1100
Marvell Miniport Driver
Microsoft .NET Framework 1.1
Microsoft .NET Framework 1.1 Security Update (KB2698023)
Microsoft .NET Framework 1.1 Security Update (KB2742597)
Microsoft .NET Framework 1.1 Security Update (KB979906)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 4 Client Profile
Microsoft Office Live Add-in 1.5
Microsoft Office PowerPoint Viewer 2007 (English)
Microsoft Office Word Viewer 2003
Microsoft Office XP Media Content
Microsoft Office XP Professional
Microsoft Publisher 2002
Microsoft Silverlight
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053
Microsoft Visual C++ 2005 Redistributable
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161
Move Networks Media Player for Internet Explorer
MSXML 4.0 SP2 (KB973688)
Napster Burn Engine
Nikon View 6
Norton 360
NVIDIA Drivers
NVIDIA PhysX v8.04.25
OGA Notifier 2.0.0048.0
Picasa 3
PS2 Multimedia Keyboard Driver
PunkBuster Services
QuickTime
Realtek High Definition Audio Driver
Security Update for CAPICOM (KB931906)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2604111)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2657424)
Security Update for Microsoft .NET Framework 3.5 SP1 (KB2736416)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2656405)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2729449)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2737019)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2742595)
Security Update for Microsoft .NET Framework 4 Client Profile (KB2789642)
Sentinel Protection Installer 7.4.0
Settings Alerter
Spelling Dictionaries Support For Adobe Reader 8
SUPERAntiSpyware
swMSM
System Requirements Lab
ThumbsPlus version 6.0
Unity Web Player
Update for Microsoft .NET Framework 3.5 SP1 (KB963707)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217)
Windows Live ID Sign-in Assistant
 



#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:56 AM

Posted 01 April 2013 - 08:05 PM


Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)
  • Programs to remove

    • Adobe Reader X (10.1.6)
      Java 7 Update 17
      Java™ 6 Update 31
      Java™ 6 Update 6
      Java™ 6 Update 7
      Java™ SE Runtime Environment 6 Update 1
      JavaFX 2.1.1


  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
  • .



    Update Adobe reader
    • Recently there have been vulnerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

      You can download it from http://www.adobe.com/products/acrobat/readstep2.html
      After installing the latest Adobe Reader, uninstall all previous versions.
      If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.
      • If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

        Note: When installing FoxitReader, be careful not to install anything to do with AskBar.

    Clean Out Temp Files
    • This small application you may want to keep and use once a week to keep the computer clean.

      Download CCleaner from here http://www.ccleaner.com/
      • Run the installer to install the application.
      • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
      • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
      • Click Run Cleaner.
      • Close CCleaner.
: Malwarebytes' Anti-Malware :


I see You have MBAM installed on the computer - that is great!! it is a very good program! I would like you to run a quick scan for me now
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
  • Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
    Click OK to either and let MBAM proceed with the disinfection process.
    If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.


    Download HijackThis
    • Go Here to download HijackThis program
    • Save HijackThis to your desktop.
    • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
    • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
    • copy and paste hijackthis report into the topic
    "information and logs"
    • In your next post I need the following
      • Log From MBAM
      • report from Hijackthis
      • let me know of any problems you may have had
      • How is the computer doing now?
    Gringo


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 ClearFocus

ClearFocus
  • Topic Starter

  • Members
  • 93 posts
  • OFFLINE
  •  
  • Local time:05:56 AM

Posted 02 April 2013 - 10:42 PM

Gringo,

 

Here are the MBAM and HJT log files

 

MBAM

 

Malwarebytes Anti-Malware 1.70.0.1100
www.malwarebytes.org

Database version: v2013.04.03.01

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Best Buy :: AR67CL65SZJ [administrator]

4/2/2013 11:31:34 PM
mbam-log-2013-04-02 (23-31-34).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 222812
Time elapsed: 6 minute(s), 6 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

 

 

HJT

 

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 11:32:18 PM, on 4/2/2013
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v9.00 (9.00.8112.16470)
Boot mode: Normal

Running processes:
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Norton 360\Engine\20.3.0.36\ccSvcHst.exe
C:\Windows\RtHDVCpl.exe
C:\Windows\zHotkey.exe
C:\Windows\ModPS2Key.exe
C:\Windows\System32\rundll32.exe
C:\Program Files\QuickTime\QTTask.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
C:\Windows\ehome\ehmsas.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\Macromed\Flash\FlashUtil32_11_6_602_180_ActiveX.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\Best Buy\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://insightbb.com/
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.gateway.com/g/startpage.html?Ch=Retail&Br=GTW&Loc=ENG_US&Sys=DTP&M=GM5472
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =
R3 - URLSearchHook: (no name) -  - (no file)
O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll
O2 - BHO: Norton Identity Protection - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\20.3.0.36\coIEPlg.dll
O2 - BHO: Norton Vulnerability Protection - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\20.3.0.36\IPS\IPSBHO.DLL
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre1.6.0_07\bin\ssv.dll
O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre1.6.0_07\bin\jp2ssv.dll (file missing)
O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\20.3.0.36\coIEPlg.dll
O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe
O4 - HKLM\..\Run: [CHotkey] zHotkey.exe
O4 - HKLM\..\Run: [ShowWnd] ShowWnd.exe
O4 - HKLM\..\Run: [ModPS2] ModPS2Key.exe
O4 - HKLM\..\Run: [amd_dc_opt] C:\Program Files\AMD\Dual-Core Optimizer\amd_dc_opt.exe
O4 - HKLM\..\Run: [NvCplDaemon] RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
O4 - HKLM\..\Run: [NvMediaCenter] RUNDLL32.EXE C:\Windows\system32\NvMcTray.dll,NvTaskbarInit
O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
O4 - HKLM\..\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe"
O4 - HKLM\..\RunOnce: [Launcher] %WINDIR%\SMINST\launcher.exe
O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe
O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
O4 - HKCU\..\Run: [SUPERAntiSpyware] C:\Program Files\SUPERAntiSpyware\SUPERAntiSpyware.exe
O4 - Global Startup: Microsoft Office.lnk = C:\Program Files\Microsoft Office\Office10\OSA.EXE
O8 - Extra context menu item: Add to Google Photos Screensa&ver - res://C:\Windows\system32\GPhotos.scr/200
O8 - Extra context menu item: E&xport to Microsoft Excel - res://C:\PROGRA~1\MICROS~2\Office10\EXCEL.EXE/3000
O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~3.0_0\bin\ssv.dll
O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - C:\PROGRA~1\Java\JRE16~3.0_0\bin\ssv.dll
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O16 - DPF: {0742B9EF-8C83-41CA-BFBA-830A59E23533} (Microsoft Data Collection Control) - https://oas.support.microsoft.com/ActiveX/MSDcode.cab
O16 - DPF: {0E5F0222-96B9-11D3-8997-00104BD12D94} - http://support.gateway.com/support/profiler/PCPitStop.CAB
O16 - DPF: {67A5F8DC-1A4B-4D66-9F24-A704AD929EEE} (System Requirements Lab) - http://www.nvidia.com/content/DriverDownload/srl/2.0.0.1/sysreqlab2.cab
O16 - DPF: {73ECB3AA-4717-450C-A2AB-D00DAD9EE203} (GMNRev Class) - http://h20614.www2.hp.com/ediags/gmd/Install/Cab/hpdetect119b.cab
O16 - DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} (Shockwave Flash Object) - http://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
O16 - DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - http://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
O16 - DPF: {F27237D7-93C8-44C2-AC6E-D6057B9A918F} (JuniperSetupClientControl Class) - https://juniper.net/dana-cached/sc/JuniperSetupClient.cab
O16 - DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} (Performance Viewer Activex Control) - https://secure.logmein.com/activex/RACtrl.cab
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: ArcSoft Connect Daemon (ACDaemon) - Unknown owner - C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe (file missing)
O23 - Service: Adobe Acrobat Update Service (AdobeARMservice) - Adobe Systems Incorporated - C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: Agere Modem Call Progress Audio (AgereModemAudio) - Agere Systems - C:\Windows\system32\agrsmsvc.exe
O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe
O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe
O23 - Service: McAfee Network Agent (McNASvc) - Unknown owner - c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe (file missing)
O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\20.3.0.36\ccSvcHst.exe
O23 - Service: NVIDIA Display Driver Service (nvsvc) - NVIDIA Corporation - C:\Windows\system32\nvvsvc.exe
O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe
O23 - Service: PnkBstrB - Unknown owner - C:\Windows\system32\PnkBstrB.exe
O23 - Service: PrismXL - New Boundary Technologies, Inc. - C:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYS
O23 - Service: vseamps - Authentium, Inc - C:\Program Files\Common Files\Authentium\AntiVirus5\vseamps.exe
O23 - Service: vsedsps - Authentium, Inc - C:\Program Files\Common Files\Authentium\AntiVirus5\vsedsps.exe
O23 - Service: vseqrts - Authentium, Inc - C:\Program Files\Common Files\Authentium\AntiVirus5\vseqrts.exe

--
End of file - 7744 bytes






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users