Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

3 unremovable win32 driver rootkits spjx.sys


  • This topic is locked This topic is locked
27 replies to this topic

#1 tsc212

tsc212

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 19 April 2013 - 05:25 AM

Attached File  attach.txt   29.34KB   1 downloadsHi I scanned my acer laptop with my AVG professional to find I had managed to get infected by 3 rootkits all attached to my drivers within the win32 system. These were missed when I scanned with super anti spyware, I have scanned my system countless times opting for removal of the Rk's but they are still there upon rebooting. I have run ccleaner where the infection  was also showing up and tried to remove and repair the registry but again still no luck. As I am unsure of the type of rootkit I am unable to search for the specific removal tool and am a bit nervous with deleting files when it comes to the win32 system as I am not that computer literate.

I would appreciate your help in trying to resolve these issues and have attached the required dds file, I could not send the log as i kept getting a message saying there was a problem and only the attach file was generated so below I have sent the avg reportAttached File  attach.txt   29.34KB   1 downloads.

 

AVG report:

"";"Inline hook ataport.SYS DllUnload -> spxj.sys +0x2F8AE, C:\Windows\System32\Drivers\spxj.sys";"Infected"

"";"i8042prt.sys, hooked import HAL.dll READ_PORT_UCHAR -> spxj.sys +0x12048, C:\Windows\System32\Drivers\spxj.sys";"Infected"

"";"atapi.sys, hooked import ataport.SYS AtaPortWritePortUchar -> spxj.sys +0x26D2, C:\Windows\System32\Drivers\spxj.sys";"Infected"
 

 

 

 

Many thanks in advance

 

Tracy



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:19 PM

Posted 19 April 2013 - 03:04 PM


Hello tsc212

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.




These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-
  • Download Security Check by screen317 from here.
    • Save it to your Desktop.
    • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
    • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
-AdwCleaner-
  • Please download AdwCleaner by Xplode onto your desktop.
    • Close all open programs and internet browsers.
    • Double click on AdwCleaner.exe to run the tool.
    • Click on Delete.
    • Confirm each time with Ok.
    • Your computer will be rebooted automatically. A text file will open after the restart.
    • Please post the content of that logfile with your next answer.
    • You can find the logfile at C:\AdwCleaner[S1].txt as well.
--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 tsc212

tsc212
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 20 April 2013 - 05:23 AM

Hi Thanks for getting back to me so quickly, unfortunately i had carried out some other processes whilst waiting for your reply and have now seen that you advise against it, sorry.

 What I did do was download and run malwarebytes and anti-malware which showed that i not only had the 3 rootkits ,my avg was showing up but also have a further 8 infections! :crazy: I

tried to remove the infections with the programme but my avg still showed them to be in the system! but one thing that was good from the scan was that it identified the infection to be a trojan vundo . I then downloaded the fix vundo tool from the symnatec website but was unable to run it since a message was displayed stating i no longer have administrator rights.!!!

I have now dl the  security check and details are as follows:

 

 Results of screen317's Security Check version 0.99.62 
 Windows Vista Service Pack 2 x86 (UAC is enabled) 
 Internet Explorer 9 
``````````````Antivirus/Firewall Check:``````````````
AVG Internet Security 2013  
 Antivirus up to date!  
`````````Anti-malware/Other Utilities Check:`````````
 Out of date HijackThis  installed!
 Spybot - Search & Destroy
 SUPERAntiSpyware Professional   
 Malwarebytes Anti-Malware version 1.75.0.1300 
 HijackThis 2.0.2   
 CCleaner    
 Eusing Free Registry Cleaner 
 Java™ 6 Update 7 
 Java version out of Date!
 Adobe Flash Player 10 Flash Player out of Date!
 Adobe Reader 8 Adobe Reader out of Date!
````````Process Check: objlist.exe by Laurent```````` 
 Malwarebytes Anti-Malware mbamservice.exe 
 Malwarebytes Anti-Malware mbamgui.exe 
 Spybot Teatimer.exe is disabled!
 AVG avgwdsvc.exe
 AVG avgrsx.exe
 AVG avgnsx.exe
 AVG avgemc.exe
 Empowering Technology eSettings Service capuserv.exe
 Malwarebytes' Anti-Malware mbamscheduler.exe  
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C:  %
````````````````````End of Log``````````````````````

 

 

l now complete  the adware cleaner.



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:19 PM

Posted 20 April 2013 - 08:35 AM

have you ran the other two programs?



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 tsc212

tsc212
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 20 April 2013 - 09:06 AM

Hi,

I have been trying to run the adw cleaner, it lets me search but nothing else,

Here is the log produced:

 

# AdwCleaner v2.200 - Fichero creado el 20/04/2013 a 15:58:47
# Actualizado el 02/04/2013 por Xplode
# Sistema operativo : Windows Vista ™ Home Basic Service Pack 2 (32 bits)
# Usuario : ShaytaeTanisha - SHAYTAETANISHA1
# Modo de inicio : Normal
# Ejecutado desde : C:\Users\ShaytaeTanisha\Desktop\adwcleaner.exe
# Opción [Búsqueda]

***** [Servicios] *****

***** [Ficheros / Carpetas] *****

Carpeta Presente : C:\Program Files\1ClickDownload
Carpeta Presente : C:\Program Files\AGI
Carpeta Presente : C:\Program Files\AVG Secure Search
Carpeta Presente : C:\Program Files\Common Files\AVG Secure Search
Carpeta Presente : C:\ProgramData\AGI
Carpeta Presente : C:\ProgramData\AVG Secure Search
Carpeta Presente : C:\ProgramData\AVG Security Toolbar
Carpeta Presente : C:\ProgramData\InstallMate
Carpeta Presente : C:\ProgramData\Premium
Carpeta Presente : C:\ProgramData\Trymedia
Carpeta Presente : C:\Users\ShaytaeTanisha\AppData\Local\AVG Secure Search
Carpeta Presente : C:\Users\ShaytaeTanisha\AppData\LocalLow\AVG Secure Search
Carpeta Presente : C:\Users\ShaytaeTanisha\AppData\LocalLow\FunWebProducts
Carpeta Presente : C:\Users\ShaytaeTanisha\AppData\Roaming\AGI
Carpeta Presente : C:\Users\ShaytaeTanisha_2\AppData\LocalLow\SweetIM
Carpeta Presente : C:\Windows\Installer\{1577A05B-EE62-4BBC-9DB7-FE748FA44EC2}

***** [Registro] *****

Clave Presente : HKCU\Software\1ClickDownload
Clave Presente : HKCU\Software\AppDataLow\Software\AVG Security Toolbar
Clave Presente : HKCU\Software\AppDataLow\Software\FocusInteractive
Clave Presente : HKCU\Software\AppDataLow\Software\Fun Web Products
Clave Presente : HKCU\Software\AppDataLow\Software\FunWebProducts
Clave Presente : HKCU\Software\AppDataLow\Software\Headlight
Clave Presente : HKCU\Software\AppDataLow\Software\MyWebSearch
Clave Presente : HKCU\Software\AVG Secure Search
Clave Presente : HKCU\Software\Binary Noise\mPlayer\kiwee_toolbar_installer.exe
Clave Presente : HKCU\Software\Complitly
Clave Presente : HKCU\Software\ImInstaller
Clave Presente : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\AVG Secure Search
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{4260E0CC-0F75-462E-88A3-1E05C248BF4C}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{95B7759C-8C7F-4BF1-B163-73684A933233}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{07B18EAB-A523-4961-B6BB-170DE4475CCA}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1A0AADCD-3A72-4B5F-900F-E3BB5A838E2A}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{1D4DB7D2-6EC9-47A3-BD87-1E41684E07BB}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{25560540-9571-4D7B-9389-0F166788785A}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3DC201FB-E9C9-499C-A11F-23C360D7C3F8}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{4260E0CC-0F75-462E-88A3-1E05C248BF4C}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{95B7759C-8C7F-4BF1-B163-73684A933233}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{9FF05104-B030-46FC-94B8-81276E4E27DF}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{BC4FFE41-DE9F-46FA-B455-AAD49B9F9938}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EEE6C35D-6118-11DC-9C72-001320C79847}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Clave Presente : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706}
Clave Presente : HKCU\Software\SWEETIE
Clave Presente : HKLM\Software\AVG Secure Search
Clave Presente : HKLM\Software\AVG Security Toolbar
Clave Presente : HKLM\SOFTWARE\Classes\AppID\{1FDFF5A2-7BB1-48E1-8081-7236812B12B2}
Clave Presente : HKLM\SOFTWARE\Classes\AppID\{BB711CB0-C70B-482E-9852-EC05EBD71DBB}
Clave Presente : HKLM\SOFTWARE\Classes\AppID\ScriptHelper.EXE
Clave Presente : HKLM\SOFTWARE\Classes\AppID\ViProtocol.DLL
Clave Presente : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI
Clave Presente : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI.1
Clave Presente : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj
Clave Presente : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj.1
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{1A0AADCD-3A72-4B5F-900F-E3BB5A838E2A}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{95B7759C-8C7F-4BF1-B163-73684A933233}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{B658800C-F66E-4EF3-AB85-6C0C227862A9}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{BC4FFE41-DE9F-46FA-B455-AAD49B9F9938}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Clave Presente : HKLM\SOFTWARE\Classes\CLSID\{F25AF245-4A81-40DC-92F9-E9021F207706}
Clave Presente : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Clave Presente : HKLM\SOFTWARE\Classes\Interface\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
Clave Presente : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Clave Presente : HKLM\SOFTWARE\Classes\Interface\{C401D2CE-DC27-45C7-BC0C-8E6EA7F085D6}
Clave Presente : HKLM\SOFTWARE\Classes\PROTOCOLS\Handler\viprotocol
Clave Presente : HKLM\SOFTWARE\Classes\S
Clave Presente : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi
Clave Presente : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi.1
Clave Presente : HKLM\SOFTWARE\Classes\SWEETIE.SWEETIE
Clave Presente : HKLM\SOFTWARE\Classes\SWEETIE.SWEETIE.1
Clave Presente : HKLM\SOFTWARE\Classes\ToolBand.SWEETIE
Clave Presente : HKLM\SOFTWARE\Classes\ToolBand.SWEETIE.1
Clave Presente : HKLM\SOFTWARE\Classes\TypeLib\{74FB6AFD-DD77-4CEB-83BD-AB2B63E63C93}
Clave Presente : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Clave Presente : HKLM\SOFTWARE\Classes\TypeLib\{C2AC8A0E-E48E-484B-A71C-C7A937FAAB94}
Clave Presente : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE
Clave Presente : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE.1
Clave Presente : HKLM\Software\ImInstaller
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{59C7FC09-1C83-4648-B3E6-003D2BBC7481}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68AF847F-6E91-45DD-9B68-D6A12C30E5D7}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9170B96C-28D4-4626-8358-27E6CAEEF907}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D1A71FA0-FF48-48DD-9B6D-7A13A3E42127}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{DDB1968E-EAD6-40FD-8DAE-FF14757F60C7}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F138D901-86F0-4383-99B6-9CDD406036DA}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{F25AF245-4A81-40DC-92F9-E9021F207706}
Clave Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll
Clave Presente : HKLM\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1A0AADCD-3A72-4B5F-900F-E3BB5A838E2A}
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233}
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C6FDD0C3-266A-4DC3-B459-28C697C44CDC}
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F25AF245-4A81-40DC-92F9-E9021F207706}
Clave Presente : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966
Clave Presente : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\980289C22F80A7C4BB9323DC61255E4E
Clave Presente : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FA96423FE2B98E248A3B23548D1E22D9
Clave Presente : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AVG Secure Search
Clave Presente : HKLM\SOFTWARE\MozillaPlugins\@avg.com/AVG SiteSafety plugin,version=11.0.0.1,application/x-avg-sitesafety-plugin
Clave Presente : HKU\S-1-5-21-27427548-1452317133-3735782299-1003\Software\Microsoft\Internet Explorer\SearchScopes\{95B7759C-8C7F-4BF1-B163-73684A933233}
Valor Presente : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{BC4FFE41-DE9F-46FA-B455-AAD49B9F9938}]
Valor Presente : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}]
Valor Presente : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{EEE6C35B-6118-11DC-9C72-001320C79847}]
Valor Presente : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{BC4FFE41-DE9F-46FA-B455-AAD49B9F9938}]
Valor Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{95B7759C-8C7F-4BF1-B163-73684A933233}]
Valor Presente : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{EF99BD32-C1FB-11D2-892F-0090271D4F88}]
Valor Presente : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [Avg@toolbar]

***** [Navegadores] *****

-\\ Internet Explorer v9.0.8112.16476

[OK] El registro no contiene ninguna entrada ilegítima.

*************************

AdwCleaner[R1].txt - [10843 octets] - [20/04/2013 12:30:20]
AdwCleaner[R2].txt - [10828 octets] - [20/04/2013 15:58:47]
AdwCleaner[S1].txt - [375 octets] - [20/04/2013 12:30:04]
AdwCleaner[S2].txt - [375 octets] - [20/04/2013 12:30:58]

########## EOF - C:\AdwCleaner[R2].txt - [11007 octets] ##########

 

 

ROGUEKILLER LOG:

RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/
Website : http://tigzy.geekstogo.com/roguekiller.php
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : ShaytaeTanisha [Admin rights]
Mode : Remove -- Date : 04/20/2013 16:04:53
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 8 ¤¤¤
[HJPOL] HKCU\[...]\System : DisableTaskMgr (0) -> DELETED
[HJPOL] HKCU\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowPrinters (0) -> REPLACED (1)
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowRun (0) -> REPLACED (1)
[HJ DESK] HKCU\[...]\ClassicStartMenu : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKCU\[...]\NewStartPanel : {645FF040-5081-101B-9F08-00AA002F954E} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
IRP[IRP_MJ_CREATE] : \SystemRoot\system32\DRIVERS\iaStor.sys -> HOOKED ([MAJOR] Unknown @ 0x86BD11F8)
IRP[IRP_MJ_CLOSE] : \SystemRoot\system32\DRIVERS\iaStor.sys -> HOOKED ([MAJOR] Unknown @ 0x86BD11F8)
IRP[IRP_MJ_DEVICE_CONTROL] : \SystemRoot\system32\DRIVERS\iaStor.sys -> HOOKED ([MAJOR] Unknown @ 0x86BD11F8)
IRP[IRP_MJ_INTERNAL_DEVICE_CONTROL] : \SystemRoot\system32\DRIVERS\iaStor.sys -> HOOKED ([MAJOR] Unknown @ 0x86BD11F8)
IRP[IRP_MJ_POWER] : \SystemRoot\system32\DRIVERS\iaStor.sys -> HOOKED ([MAJOR] Unknown @ 0x86BD11F8)
IRP[IRP_MJ_SYSTEM_CONTROL] : \SystemRoot\system32\DRIVERS\iaStor.sys -> HOOKED ([MAJOR] Unknown @ 0x86BD11F8)
IRP[IRP_MJ_PNP] : \SystemRoot\system32\DRIVERS\iaStor.sys -> HOOKED ([MAJOR] Unknown @ 0x86BD11F8)

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1       localhost
::1             localhost
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.100888290cs.com
127.0.0.1 100888290cs.com
127.0.0.1 www.100sexlinks.com
127.0.0.1 100sexlinks.com
127.0.0.1 www.10sek.com
127.0.0.1 10sek.com
127.0.0.1 www.123topsearch.com
127.0.0.1 123topsearch.com
[...]

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST980811AS +++++
--- User ---
[MBR] ab586a47564e1e77cb8a85721b32c2f6
[BSP] 4beb733bd882e5aa60a0d136f0ea02b4 : Acer MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 10000 Mo
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 20482048 | Size: 35504 Mo
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 93194240 | Size: 30813 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[2]_D_04202013_02d1604.txt >>
RKreport[1]_S_04202013_02d1603.txt ; RKreport[2]_D_04202013_02d1604.txt



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:19 PM

Posted 20 April 2013 - 11:45 AM


Hello tsc212

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 tsc212

tsc212
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 20 April 2013 - 03:34 PM

Hi Gringo,

I disabled my avg and have run combofix numerous times as it never produced the log you said it would, it also give a windows message saying its processes were blocked to protect the pc. Upon mid way through the scan it also gave a message to update the combofix which i did on the 3rd time but to still no avail. Sorry I am unable to give you any further details.



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:19 PM

Posted 20 April 2013 - 04:01 PM



Hello tsc212


I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
and I will see if I want to see the whole report

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit
2.Unzip the contents to a folder in a convenient location.
3.Open the folder where the contents were unzipped and run mbar.exe
4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
6.Wait while the system shuts down and the cleanup process is performed.
7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
  • •Internet access
    •Windows Update
    •Windows Firewall
9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
10.Verify that your system is now functioning normally.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and MBAR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 tsc212

tsc212
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 21 April 2013 - 04:46 AM

Hi,

I have followed the steps you advised and here is what has happend I dl'd tdsskiller and ran once which was fine and showed 10 infections and there was a report produced, I quarantined them and rebooted. Upon start up the report was no where to be found, so I re ran the software only for a blue screen of death appearing stating bad_pool_caller, half way through the scan. I again rebooted ran the malwarebytes anti malware which showed no infections, so all was looking good I then re ran my avg to see if it had been cleared but the 3 infections that were there at the start.

So I went back to the start and re ran the tdsskiller changing the parameters like you suggested, this time i have got the report but am unable to copy and paste it so I have taken a screen shot of the end results and attached them as a word doc.

I will now rescan with the malwarebytes and forward the report. 

 

Attached Files



#10 tsc212

tsc212
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 21 April 2013 - 06:03 AM

hi I have completed the malwarebytes  and altough it has given me a log it is not allowing me to paste it here, but the details are as follows:

 

database version: v2013.04.2.03

windows vista service pack 2 x86 ntfs

internet explorer 9.0.8112.16421

protection enables

mbam-log-2013-4-21

quick scan

0 items detected.

 

but still avg is showing as infected.!???



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:19 PM

Posted 21 April 2013 - 03:25 PM


Hello tsc212

Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.
after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 tsc212

tsc212
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 21 April 2013 - 05:10 PM

Hi gringo,

Please find combofix log attached for some reason it continues to not allow me to paste here the log, one thing that keeps flagging upis that the pc is telling to go to the administrator profile although i am already using it

 

Attached Files



#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:19 PM

Posted 21 April 2013 - 06:04 PM

Hello

while you are editing your reply you will see a square at the top left of the edit screen toggle this off and see if you can copy and paste

Attached Files


I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 tsc212

tsc212
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:11:19 PM

Posted 22 April 2013 - 03:02 AM

well done it worked. onemore thing however although my security says it is working i just had a security alert advising i quit my connection assomeone may be able too information i am entering??

 

ComboFix 13-04-20.02 - ShaytaeTanisha 21/04/2013  23:39:03.1.1 - x86 MINIMAL
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.44.3082.18.2038.1449 [GMT 2:00]
Running from: C:\Users\ShaytaeTanisha\Desktop\ComboFix.exe
AV: AVG Internet Security 2013 *Enabled/Updated* {0E9420C4-06B3-7FA0-3AB1-6E49CB52ECD9}
FW: AVG Internet Security 2013 *Disabled* {36AFA1E1-4CDC-7EF8-11EE-C77C3581ABA2}
SP: AVG Internet Security 2013 *Enabled/Updated* {B5F5C120-2089-702E-0001-553BB0D5A664}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point

(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))

---- Previous Run -------

C:\Program Files\pst\E-Prime\Documentation\GettingStartedGuide.pdf
C:\Program Files\pst\E-Prime\Documentation\ReferenceGuide.pdf
C:\Program Files\pst\E-Prime\Documentation\UsersGuide.pdf
C:\Program Files\pst\E-Prime\EPrimeInstall.dll
C:\Program Files\pst\E-Prime\License.txt
C:\Program Files\pst\E-Prime\Program\ActivationWizard.exe
C:\Program Files\pst\E-Prime\Program\BasicRT.ebs
C:\Program Files\pst\E-Prime\Program\ClockExtension.ebn
C:\Program Files\pst\E-Prime\Program\CoreExtension.ebn
C:\Program Files\pst\E-Prime\Program\CSH.DLL
C:\Program Files\pst\E-Prime\Program\Device.tlb
C:\Program Files\pst\E-Prime\Program\DeviceHelpers.dll
C:\Program Files\pst\E-Prime\Program\Devices\DisplayDevice.dll
C:\Program Files\pst\E-Prime\Program\Devices\KeyboardDevice.dll
C:\Program Files\pst\E-Prime\Program\Devices\MouseDevice.dll
C:\Program Files\pst\E-Prime\Program\Devices\PortDevice.dll
C:\Program Files\pst\E-Prime\Program\Devices\SerialDevice.dll
C:\Program Files\pst\E-Prime\Program\Devices\SoundDevice.dll
C:\Program Files\pst\E-Prime\Program\Devices\SRBOXDevice.dll
C:\Program Files\pst\E-Prime\Program\DisplayExtension.ebn
C:\Program Files\pst\E-Prime\Program\E-Basic.CNT
C:\Program Files\pst\E-Prime\Program\E-BASIC.HLP
C:\Program Files\pst\E-Prime\Program\E-DataAid.CNT
C:\Program Files\pst\E-Prime\Program\E-DataAid.exe
C:\Program Files\pst\E-Prime\Program\E-DataAid.hlp
C:\Program Files\pst\E-Prime\Program\E-DataAidCSH.hlp
C:\Program Files\pst\E-Prime\Program\E-Merge.CNT
C:\Program Files\pst\E-Prime\Program\E-Merge.exe
C:\Program Files\pst\E-Prime\Program\E-Merge.hlp
C:\Program Files\pst\E-Prime\Program\E-ObjectLogging.dll
C:\Program Files\pst\E-Prime\Program\E-Objects\ImageDisplay.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\InLine.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\Label.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\List.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\PackageCall.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\Procedure.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\Slide.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\SoundOut.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\TextDisplay.ocx
C:\Program Files\pst\E-Prime\Program\E-Objects\Wait.ocx
C:\Program Files\pst\E-Prime\Program\E-Recovery.CNT
C:\Program Files\pst\E-Prime\Program\E-Recovery.exe
C:\Program Files\pst\E-Prime\Program\E-Recovery.hlp
C:\Program Files\pst\E-Prime\Program\E-Runtime.dll
C:\Program Files\pst\E-Prime\Program\E-Studio.cnt
C:\Program Files\pst\E-Prime\Program\E-Studio.exe
C:\Program Files\pst\E-Prime\Program\E-Studio.hlp
C:\Program Files\pst\E-Prime\Program\E-StudioHelpers.dll
C:\Program Files\pst\E-Prime\Program\E-StudioWizard.tlb
C:\Program Files\pst\E-Prime\Program\E-Upgrade.dll
C:\Program Files\pst\E-Prime\Program\EDataAidAnalysisMacros.xla
C:\Program Files\pst\E-Prime\Program\FactorExtension.ebn
C:\Program Files\pst\E-Prime\Program\FactorTableWizard.xls
C:\Program Files\pst\E-Prime\Program\IFISExtension.ebn
C:\Program Files\pst\E-Prime\Program\KeyboardExtension.ebn
C:\Program Files\pst\E-Prime\Program\keywords.ini
C:\Program Files\pst\E-Prime\Program\MouseExtension.ebn
C:\Program Files\pst\E-Prime\Program\PortExtension.ebn
C:\Program Files\pst\E-Prime\Program\PSTNCM22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNCX22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNDC22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNDD22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNDG22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNOL22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNPB22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNRN22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNTL22.DLL
C:\Program Files\pst\E-Prime\Program\PSTNUASM.DLL
C:\Program Files\pst\E-Prime\Program\RunOpenUniversity.exe
C:\Program Files\pst\E-Prime\Program\SerialExtension.ebn
C:\Program Files\pst\E-Prime\Program\SocketExtension.ebn
C:\Program Files\pst\E-Prime\Program\SoundExtension.ebn
C:\Program Files\pst\E-Prime\Program\SRBoxExtension.ebn
C:\Program Files\pst\E-Prime\Program\STDOLE2.TLB
C:\Program Files\pst\E-Prime\Program\WebRequest.dll
C:\Program Files\pst\E-Prime\Program\Wizards\ChoiceReactionTimeWizard.dll
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\BasicRT\BasicRT.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\NestingRT\NestingRT.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\NestingXRT\NestingXRT.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\PictureRT\BlueCar.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\PictureRT\PictureRT.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\PictureRT\RedCar.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SlideRT\down.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SlideRT\left.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SlideRT\right.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SlideRT\SlideRT.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SlideRT\up.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SoundRT\APPLEF.WAV
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SoundRT\CANARYF.WAV
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\SoundRT\SoundRT.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\CC.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\CL.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\correct.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\CR.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\cueLoc.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\cueWord.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\error.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\LC.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\LL.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\LR.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\PrimeStroop.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\RC.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\RL.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\RR.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\SCREENSTROOP.ES
C:\Program Files\pst\E-Prime\Samples And Tutorials\Samples\TMA01\SOUNDSTROOP.ES
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Bob.WAV
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\CANARYF.WAV
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\PictureTutorial.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\SoundTutorial.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\SRBoxTutorial.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\Tutorial-1-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\Tutorial-2-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\Tutorial-3-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\Tutorial-4-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\Tutorial-5-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Originals\Tutorial.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Tutorial-1-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Tutorial-2-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Tutorial-3-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Tutorial-4-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Data\Tutorial-5-1.edat
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\E-BasicExample.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\E-BasicSoundExample.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Female.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Linda.WAV
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Male.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\RedCar.bmp
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Tones.wav
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage2-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage3-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage3-MethodA-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage3-MethodB-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage3-MethodC-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage4-ChangeTrialProc-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage4-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage4-NestedBlockList-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage5-LexicalDecision001.es
C:\Program Files\pst\E-Prime\Samples And Tutorials\Tutorials\Using E-Studio Stages\Stage6-LexicalDecision001.es
C:\Users\ShaytaeTanisha\AppData\Roaming\inst.exe
C:\Users\ShaytaeTanisha\AppData\Roaming\vso_ts_preview.xml
C:\Windows\msvcr71.dll
C:\Windows\system32\Cache\1d5e738281104436.fb
C:\Windows\system32\Cache\26c630d098e22dd5.fb
C:\Windows\system32\Cache\272512937d9e61a4.fb
C:\Windows\system32\Cache\287204568329e189.fb
C:\Windows\system32\Cache\28bc8f716fd76a47.fb
C:\Windows\system32\Cache\31a0997e9a5b5eb3.fb
C:\Windows\system32\Cache\32c84fe32bb74d60.fb
C:\Windows\system32\Cache\3917078cb68ec657.fb
C:\Windows\system32\Cache\590ba23ce359fd0c.fb
C:\Windows\system32\Cache\610289e025a3ee9a.fb
C:\Windows\system32\Cache\651c5d3cdbfb8bd1.fb
C:\Windows\system32\Cache\6c59ac5e7e7a3ad0.fb
C:\Windows\system32\Cache\6d03dad1035885d3.fb
C:\Windows\system32\Cache\78c799fdbeceb102.fb
C:\Windows\system32\Cache\7a15d4d1744e3044.fb
C:\Windows\system32\Cache\7de74434d7eb6b21.fb
C:\Windows\system32\Cache\95f567698be8a182.fb
C:\Windows\system32\Cache\a8556537add6dfc5.fb
C:\Windows\system32\Cache\ad10a52aff5e038d.fb
C:\Windows\system32\Cache\c1fa887b03019701.fb
C:\Windows\system32\Cache\c4d28dca2e7648be.fb
C:\Windows\system32\Cache\d201ef9910cd39de.fb
C:\Windows\system32\Cache\d2e94710a5708128.fb
C:\Windows\system32\Cache\d79b9dfe81484ec4.fb
C:\Windows\system32\Cache\f998975c9cc711ee.fb
C:\Windows\system32\drivers\etc\hosts.ics
C:\Windows\system32\SET4D3F.tmp
C:\Windows\system32\swctl.dll

-- Previous Run --

Infected copy of C:\Windows\system32\user32.dll was found and disinfected
Restored copy from - C:\ComboFix\HarddiskVolumeShadowCopy1_!Windows!System32!user32.dll

--------

 

 



#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:19 PM

Posted 22 April 2013 - 03:14 AM



Hello tsc212


I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.

    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it

    If the forum still complains about it being to long send me everything that is at the end of the report after where it says

    ==================
    Scan finished
    ==================
and I will see if I want to see the whole report

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit
2.Unzip the contents to a folder in a convenient location.
3.Open the folder where the contents were unzipped and run mbar.exe
4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
6.Wait while the system shuts down and the cleanup process is performed.
7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
  • •Internet access
    •Windows Update
    •Windows Firewall
9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
10.Verify that your system is now functioning normally.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and MBAR

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users