Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Removed FBI Virus with Kickstart, Now a new problem on bootup.


  • This topic is locked This topic is locked
28 replies to this topic

#1 keny1

keny1

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:05:51 PM

Posted 15 May 2013 - 02:39 PM

Hi All,  The infected computer  is a desktop with Vista Home Premium service pack 2, 2007 on a Acer Aspire M1641 Pentium dual cpu e2180 32 bit. 

 

The computer now boots to the CMD command window. How can I get it to boot to the normal Desktop?

 

 

The FBI virus would not boot to any of the safe modes.  I made a bootable USB from this site: http://www.surfright.nl/en/kickstart    I had trouble following the instruction, at first, Kickstart would not run while the infected computer was connected to the internet modem.  With out the modem connected, Kickstart detected 113 objects and deleted them, but did not find any FBI virus. On reboot the FBI screen was there again.  Finale I got Kickstart to run after the sixth try.  Kickstart found these three objects. 665e35f6.dll, 665e35f6.exe, and Browser.exe and deleted them.  On exit and auto reboot the cmd.exe command window appears and states: 665e35f6.exe is not recognized as an internal or external command.

 

 I tried this tool.  www.bleepingcomputer.com/download/junkware-removal-tool/    (jrt.exe)

I did not get it to work. I downloaded jrt.exe to the USB that has Kickstart on it. Tried loading to infected computer. CMD window opens, but when I try to run jtr.exe is states not found. I tried to cd.. to e: , e: shows but then changes back to the directory I was in. 

 

FBI seem to be gone. infected computer now boots to the cmd command window. I run the command: (explorer) and the computer loads the home page with the cmd window still showing. Exit CMD window and can use computer nomally, the task bar is missing some icons in the notification area.  From Explorer I could now download the JRT.exe tool from:

bleepingcomputer.com/download/junkware-removal-tool/

JRT.exe ran fine and found some additional problems and removed them. But Still boots to CMD window. I could use help to correct this.

 

I ran rkill and malwarebytes to see what else is present, and found nothing.   Thank you very much for the help. Kenny Lyon kenylyon@hotmail.com  

---------------------------------

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 9.0.8112.16450  BrowserJavaVersion: 10.15.2
Run by Dick at 11:51:52 on 2013-05-15
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.1791.788 [GMT -7:00]
.
AV: Microsoft Security Essentials *Disabled/Updated* {108DAC43-C256-20B7-BB05-914135DA5160}
AV: McAfee VirusScan *Enabled/Outdated* {2A28CCAF-2E53-0F80-A82C-9572D1C24D8C}
SP: McAfee VirusScan *Enabled/Updated* {91492D4B-0869-000E-929C-AE00AA450731}
SP: Microsoft Security Essentials *Disabled/Updated* {ABEC4DA7-E46C-2F39-81B5-AA334E5D1BDD}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
FW: McAfee Personal Firewall *Enabled* {12134D8A-643C-0ED8-8373-3C472F110AF7}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\SLsvc.exe
C:\Program Files\HitmanPro\hmpsched.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Acer Arcade Live\Acer HomeMedia Connect\Kernel\DMS\CLMSServer.exe
C:\Acer\Empowering Technology\ePerformance\MemCheck.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\McAfee\SiteAdvisor\McSACore.exe
c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe
C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe
C:\Program Files\McAfee\MPF\MPFSrv.exe
C:\Program Files\McAfee\MSK\MskSrver.exe
C:\Program Files\CyberLink\Shared Files\RichVideo.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe
C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe
C:\Windows\system32\WUDFHost.exe
C:\Acer\Empowering Technology\SysMonitor.exe
C:\Acer\Empowering Technology\eDataSecurity\x86\eDSLoader.exe
C:\Program Files\McAfee.com\Agent\mcagent.exe
C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
C:\Windows\System32\nvraidservice.exe
C:\Program Files\D-Link\Wireless G WDA-1320\AirGCFG.exe
C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Program Files\McAfee\Common Framework\UdaterUI.exe
C:\Program Files\DivX\DivX Update\DivXUpdate.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Windows\ehome\ehtray.exe
C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\system32\wbem\unsecapp.exe
C:\Windows\System32\mobsync.exe
C:\Program Files\McAfee\Common Framework\McTray.exe
C:\Program Files\Yahoo!\Messenger\ymsgr_tray.exe
C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exe
C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe
C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe
c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\PROGRA~1\mcafee\msc\mcuimgr.exe
C:\Windows\explorer.exe
C:\Program Files\Windows Media Player\WMPNSCFG.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Program Files\Internet Explorer\iexplore.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k hpdevmgmt
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\System32\svchost.exe -k HPZ12
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://att.net/
uSearch Bar = Preserve
uSearch Page = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sp/sbcydsl/*http://www.yahoo.com
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://en.us.acer.yahoo.com
mSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
mDefault_Page_URL = hxxp://en.us.acer.yahoo.com
uSearchURL,(Default) = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/su/sbcydsl/*http://www.yahoo.com
uWinlogon: Shell = cmd.exe
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: DivX Plus Web Player HTML5 <video>: {326E768D-4182-46FD-9C16-1449A49795F4} - c:\program files\divx\divx plus web player\ie\divxhtml5\DivXHTML5.dll
BHO: McAfee Phishing Filter: {377C180E-6F0E-4D4C-980F-F45BD3D40CF4} - c:\program files\mcafee\msk\mcapbho.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: scriptproxy: {7DB2D5A0-7241-4E79-B68D-6309F01C5231} - c:\program files\mcafee\virusscan\scriptsn.dll
BHO: Google Toolbar Helper: {AA58ED58-01DD-4d91-8333-CF10577473F7} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
BHO: McAfee SiteAdvisor BHO: {B164E929-A1B6-4A06-B104-2CD0E90A88FF} - c:\program files\mcafee\siteadvisor\McIEPlg.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
BHO: SingleInstance Class: {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - c:\program files\yahoo!\companion\installs\cpn5\YTSingleInstance.dll
TB: Google Toolbar: {2318C2B1-4965-11D4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
TB: Acer eDataSecurity Management: {5CBE3B7C-1E47-477e-A7DD-396DB0476E29} - c:\acer\empowering technology\edatasecurity\x86\eDStoolbar.dll
TB: Yahoo! Toolbar: {EF99BD32-C1FB-11D2-892F-0090271D4F88} - c:\program files\yahoo!\companion\installs\cpn7\yt.dll
TB: McAfee SiteAdvisor Toolbar: {0EBBBE48-BAD4-4B4C-8E5A-516ABECAE064} - c:\program files\mcafee\siteadvisor\McIEPlg.dll
TB: Google Toolbar: {2318C2B1-4965-11d4-9B18-009027A5CD4F} - c:\program files\google\google toolbar\GoogleToolbar_32.dll
EB: &Research: {FF059E31-CC5A-4E2E-BF3B-96E929D65503} - c:\program files\microsoft office\office11\REFIEBAR.DLL
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
uRun: [Yahoo! Pager] "c:\program files\yahoo!\messenger\YahooMessenger.exe" -quiet
uRun: [wshgf] "c:\windows\system32\rundll32.exe" "c:\users\dick\appdata\roaming\wshgf.dll",GetMagicNumber
uRun: [Focevy] c:\users\dick\appdata\roaming\ybla\symay.exe
uRunOnce: [FlashPlayerUpdate] c:\windows\system32\macromed\flash\FlashUtil32_11_6_602_180_ActiveX.exe -update activex
mRun: [Acer Empowering Technology Monitor] c:\acer\empowering technology\SysMonitor.exe
mRun: [eDataSecurity Loader] c:\acer\empowering technology\edatasecurity\x86\eDSloader.exe
mRun: [mcagent_exe] c:\program files\mcafee.com\agent\mcagent.exe /runkey
mRun: [NvSvc] RUNDLL32.EXE c:\windows\system32\nvsvc.dll,nvsvcStart
mRun: [SMSERIAL] c:\program files\motorola\smserial\sm56hlpr.exe
mRun: [Acer Product Registration] "c:\program files\acer registration\ACE1.exe" /startup
mRun: [Acer Assist Launcher] c:\program files\acer assist\launcher.exe
mRun: [NVRaidService] c:\windows\system32\nvraidservice.exe
mRun: [D-Link Wireless G WDA-1320] c:\program files\d-link\wireless g wda-1320\AirGCFG.exe
mRun: [ANIWZCS2Service] c:\program files\ani\aniwzcs2 service\WZCSLDR2.exe
mRun: [McAfeeUpdaterUI] "c:\program files\mcafee\common framework\UdaterUI.exe" /StartedFromRunKey
mRun: [PCMMediaSharing] c:\program files\acer arcade live\acer homemedia connect\kernel\dms\PCMMediaSharing.exe
mRun: [DivXUpdate] "c:\program files\divx\divx update\DivXUpdate.exe" /CHECKNOW
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:145
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
mPolicies-Explorer: NoDriveTypeAutoRun = dword:145
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
DPF: Microsoft XML Parser for Java - file://c:\windows\java\classes\xmldso.cab
DPF: {3860DD98-0549-4D50-AA72-5D17D200EE10} - hxxp://cdn.scan.onecare.live.com/resource/download/scanner/en-Us/wlscctrl2.cab
DPF: {67DABFBF-D0AB-41FA-9C46-CC0F21721616} - hxxp://download.divx.com/player/DivXBrowserPlugin.cab
DPF: {E2883E8F-472F-4FB0-9522-AC9BF37916A7} - hxxp://platformdl.adobe.com/NOS/getPlusPlus/1.6/gp.cab
DPF: {E77F23EB-E7AB-4502-8F37-247DBAF1A147} - hxxp://gfx2.hotmail.com/mail/w4/pr01/photouploadcontrol/VistaMSNPUplden-us.cab
TCP: NameServer = 192.168.1.254
TCP: Interfaces\{4B89E525-B2FE-4E02-B769-D671257BBDE6} : DHCPNameServer = 192.168.1.254
TCP: Interfaces\{63FF349B-EA83-45E2-9848-F619675F9862} : DHCPNameServer = 192.168.1.254
Handler: cetihpz - {CF184AD3-CDCB-4168-A3F7-8E447D129300} - c:\program files\hp\hpcoretech\comp\hpuiprot.dll
Handler: dssrequest - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\program files\mcafee\siteadvisor\McIEPlg.dll
Handler: sacore - {5513F07E-936B-4E52-9B00-067394E91CC5} - c:\program files\mcafee\siteadvisor\McIEPlg.dll
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\26.0.1410.64\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\dick\appdata\roaming\mozilla\firefox\profiles\82w9mbch.default\
FF - component: c:\program files\mcafee\siteadvisor\components\McFFPlg.dll
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\divx\divx ovs helper\npovshelper.dll
FF - plugin: c:\program files\divx\divx plus web player\npdivx32.dll
FF - plugin: c:\program files\google\update\1.3.21.135\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre6\bin\plugin2\npdeployJava1.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\mcafee\siteadvisor\NPMcFFPlg32.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npCouponPrinter.dll
FF - plugin: c:\program files\mozilla firefox\plugins\npMozCouponPrinter.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_6_602_180.dll
FF - plugin: c:\windows\system32\npDeployJava1.dll
FF - plugin: c:\windows\system32\npmproxy.dll
FF - plugin: c:\windows\system32\npptools.dll
FF - ExtSQL: !HIDDEN! 2013-05-01 10:16; {3584d114-0f5d-4af1-97f5-d82363d7ca0a}; c:\users\dick\appdata\roaming\mozilla\firefox\profiles\82w9mbch.default\extensions\{3584d114-0f5d-4af1-97f5-d82363d7ca0a}.xpi
.
============= SERVICES / DRIVERS ===============
.
R1 jswpslwf;JumpStart Wireless Filter Driver;c:\windows\system32\drivers\jswpslwf.sys [2008-8-28 20352]
R1 mfehidk;McAfee Inc.;c:\windows\system32\drivers\mfehidk.sys [2008-3-16 201288]
R1 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2010-3-25 165648]
R2 Acer HomeMedia Connect Service;Acer HomeMedia Connect Service;c:\program files\acer arcade live\acer homemedia connect\kernel\dms\CLMSServer.exe [2010-5-5 269448]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 HitmanProScheduler;HitmanPro Scheduler;c:\program files\hitmanpro\hmpsched.exe [2013-5-13 106280]
R2 McAfee SiteAdvisor Service;McAfee SiteAdvisor Service;c:\program files\mcafee\siteadvisor\McSACore.exe [2008-9-28 95232]
R2 McProxy;McAfee Proxy Service;c:\progra~1\common~1\mcafee\mcproxy\mcproxy.exe [2008-3-16 359248]
R2 McShield;McAfee Real-time Scanner;c:\progra~1\mcafee\viruss~1\mcshield.exe [2008-3-16 144704]
R2 McTaskManager;McAfee Task Manager;c:\program files\mcafee\virusscan enterprise\VsTskMgr.exe [2007-2-22 54872]
R3 A3AB;D-Link AirPro 802.11a/b Wireless Adapter Service(A3AB);c:\windows\system32\drivers\A3ABv.sys [2008-8-28 738304]
R3 McSysmon;McAfee SystemGuards;c:\progra~1\mcafee\viruss~1\mcsysmon.exe [2008-3-16 695624]
R3 mfeavfk;McAfee Inc.;c:\windows\system32\drivers\mfeavfk.sys [2008-3-16 79304]
R3 mfebopk;McAfee Inc.;c:\windows\system32\drivers\mfebopk.sys [2008-3-16 35240]
R3 mfesmfk;McAfee Inc.;c:\windows\system32\drivers\mfesmfk.sys [2008-3-16 40488]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files\d-link\wireless g wda-1320\jswutilvst\jswpsapi.exe [2008-8-28 942080]
S3 LLUSBFLT;LLUSBFLT;c:\windows\system32\drivers\llusbflt.sys [2005-8-3 4736]
S3 mferkdk;McAfee Inc.;c:\windows\system32\drivers\mferkdk.sys [2008-3-16 33800]
S3 MpNWMon;Microsoft Malware Protection Network Driver;c:\windows\system32\drivers\MpNWMon.sys [2010-3-25 43392]
S3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\drivers\NisDrvWFP.sys [2010-10-24 65024]
S3 NisSrv;Microsoft Network Inspection;c:\program files\microsoft security client\antimalware\NisSrv.exe [2011-4-27 208944]
S3 PLUsbbc2;High-Speed USB Bridge Cable Driver;c:\windows\system32\drivers\usbbc2.sys [2005-8-3 8960]
S3 Usblink;Usblink Driver;c:\windows\system32\drivers\ulink.sys [2009-3-15 37616]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
.
=============== Created Last 30 ================
.
2013-05-13 20:55:19 -------- d-----w- c:\windows\ERUNT
2013-05-13 20:54:58 -------- d-----w- C:\JRT
2013-05-13 15:38:15 -------- d-----w- c:\program files\HitmanPro
2013-05-13 15:36:09 -------- d-----w- c:\programdata\HitmanPro
2013-04-21 15:55:56 -------- d-----w- C:\TDSSKiller_Quarantine
.
==================== Find3M  ====================
.
2013-05-15 18:24:44 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-05-15 18:24:44 692104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-04-04 21:50:32 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-02-20 22:17:12 94112 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-02-20 22:17:08 861088 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-02-20 22:17:08 782240 ----a-w- c:\windows\system32\deployJava1.dll
.
============= FINISH: 11:53:04.65 ===============
 

 

 

 

 

 

 

     

 

 

 

 

 

 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 15 May 2013 - 08:28 PM


Hello keny1

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:

    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt
  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • First Press the Scan button.
  • It will make a log (FRST.txt)
  • Second Type the following in the edit box after "Search:". services.exe
  • Click the Search button
  • It will make a log (Search.txt)
I want you to poste Both the FRST.txt report and the Search.txt into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 keny1

keny1
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:05:51 PM

Posted 16 May 2013 - 01:52 PM

Hi Gringo  I will be a little slow in answering you.  I'm still saving files, photo, etc.  Some files I can not find, they maybe gone already.

I may have those on another computer.   On reboot the computer now goes to CMD command Window.  I type in Explorer and the desttop comes up.  I noticed that the "computer" icon is missing from the desktop.  A window pops up and states Roaming\wshgf.dll could not be found.  Here are the two files you wanted. THANKS for your help Kenny Lyon kenylyon@hotmail.com

*****************************

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 14-05-2013
Ran by SYSTEM on 16-05-2013 10:48:24
Running from F:\
Windows Vista ™ Home Premium (X86) OS Language: English(US)
Internet Explorer Version 9
Boot Mode: Recovery
The current controlset is ControlSet001
ATTENTION!:=====> FRST is updated to run from normal or Safe mode to produce a full FRST.txt log and Addition.txt log.

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [Acer Empowering Technology Monitor] C:\Acer\Empowering Technology\SysMonitor.exe [326176 2008-01-09] ()
HKLM\...\Run: [eDataSecurity Loader] C:\Acer\Empowering Technology\eDataSecurity\x86\eDSloader.exe [526896 2008-03-04] (Egis Incorporated)
HKLM\...\Run: [mcagent_exe] C:\Program Files\McAfee.com\Agent\mcagent.exe /runkey [582992 2007-08-03] (McAfee, Inc.)
HKLM\...\Run: [NvSvc] RUNDLL32.EXE C:\Windows\system32\nvsvc.dll,nvsvcStart [86016 2007-12-21] (NVIDIA Corporation)
HKLM\...\Run: [SMSERIAL] C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe [630784 2007-02-01] (Motorola Inc.)
HKLM\...\Run: [Acer Product Registration] "C:\Program Files\Acer Registration\ACE1.exe" /startup [3387392 2007-10-15] (Leader Technologies)
HKLM\...\Run: [Acer Assist Launcher] C:\Program Files\Acer Assist\launcher.exe [1261568 2007-02-02] ()
HKLM\...\Run: [NVRaidService] C:\Windows\system32\nvraidservice.exe [196128 2007-12-07] (NVIDIA Corporation)
HKLM\...\Run: [D-Link Wireless G WDA-1320] C:\Program Files\D-Link\Wireless G WDA-1320\AirGCFG.exe [1662976 2007-08-29] (D-Link)
HKLM\...\Run: [ANIWZCS2Service] C:\Program Files\ANI\ANIWZCS2 Service\WZCSLDR2.exe [49152 2007-01-19] (Wireless Service)
HKLM\...\Run: [McAfeeUpdaterUI] "C:\Program Files\McAfee\Common Framework\UdaterUI.exe" /StartedFromRunKey [136768 2006-12-19] (McAfee, Inc.)
HKLM\...\Run: [PCMMediaSharing] C:\Program Files\Acer Arcade Live\Acer HomeMedia Connect\Kernel\DMS\PCMMediaSharing.exe [204908 2008-05-20] ()
HKLM\...\Run: [DivXUpdate] "C:\Program Files\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW [1259376 2011-07-28] ()
HKLM\...\Run: [Adobe ARM] "C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM\...\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59720 2013-01-28] (Apple Inc.)
HKLM\...\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe" [252848 2012-07-03] (Sun Microsystems, Inc.)
HKLM\...\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe" [152392 2013-02-20] (Apple Inc.)
HKLM Group Policy restriction on software: %HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache%OLK* <====== ATTENTION
HKLM\...\Winlogon: [System]
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox] fastprox.dll ATTENTION! ====> ZeroAccess
HKU\Default\...\RunOnce: [RUN] C:\Windows\Acer_Normal\run_DT.exe [ 2007-04-19] ()
HKU\Default User\...\RunOnce: [RUN] C:\Windows\Acer_Normal\run_DT.exe [ 2007-04-19] ()
HKU\Dick\...\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe [ 2008-01-20] (Microsoft Corporation)
HKU\Dick\...\Run: [Yahoo! Pager] "C:\Program Files\Yahoo!\Messenger\YahooMessenger.exe" -quiet [ 2007-08-30] (Yahoo! Inc.)
HKU\Dick\...\Run: [wshgf] "C:\Windows\System32\rundll32.exe" "C:\Users\Dick\AppData\Roaming\wshgf.dll",GetMagicNumber [ 2006-11-02] (Microsoft Corporation)
HKU\Dick\...\Run: [Focevy] C:\Users\Dick\AppData\Roaming\Ybla\symay.exe [x]
HKU\Dick\...\Policies\system: [LogonHoursAction] 2
HKU\Dick\...\Policies\system: [DontDisplayLogonHoursWarnings] 1
HKU\Dick\...\Winlogon: [Shell] cmd.exe [ 2008-01-20] (Microsoft Corporation) <==== ATTENTION
Startup: C:\ProgramData\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
ShortcutTarget: HP Digital Imaging Monitor.lnk -> C:\Program Files\HP\Digital Imaging\bin\hpqtra08.exe (Hewlett-Packard Co.)

========================== Services (Whitelisted) =================

S2 Acer HomeMedia Connect Service; C:\Program Files\Acer Arcade Live\Acer HomeMedia Connect\Kernel\DMS\CLMSServer.exe [269448 2008-05-20] (CyberLink)
S2 AcerMemUsageCheckService; C:\Acer\Empowering Technology\ePerformance\MemCheck.exe [28672 2007-10-17] ()
S2 eDataSecurity Service; C:\Acer\Empowering Technology\eDataSecurity\x86\eDSService.exe [500784 2008-03-04] (Egis Incorporated)
S2 eRecoveryService; C:\Acer\Empowering Technology\eRecovery\eRecoveryService.exe [57344 2007-09-10] (Acer Inc.)
S2 eSettingsService; C:\Acer\Empowering Technology\eSettings\Service\capuserv.exe [24576 2007-12-19] ()
S2 HitmanProScheduler; C:\Program Files\HitmanPro\hmpsched.exe [106280 2013-05-13] (SurfRight B.V.)
S3 jswpsapi; C:\Program Files\D-Link\Wireless G WDA-1320\JSWUtilVst\jswpsapi.exe [942080 2007-08-02] (Atheros Communications, Inc.)
S2 McAfee SiteAdvisor Service; C:\Program Files\McAfee\SiteAdvisor\McSACore.exe [95232 2012-12-04] (McAfee, Inc.)
S2 mcmscsvc; C:\PROGRA~1\McAfee\MSC\mcmscsvc.exe [767976 2008-01-09] (McAfee, Inc.)
S2 McNASvc; c:\PROGRA~1\COMMON~1\mcafee\mna\mcnasvc.exe [2458128 2008-01-25] (McAfee, Inc.)
S3 McODS; C:\PROGRA~1\McAfee\VIRUSS~1\mcods.exe [378184 2007-07-25] (McAfee, Inc.)
S2 McProxy; c:\PROGRA~1\COMMON~1\mcafee\mcproxy\mcproxy.exe [359248 2007-08-15] (McAfee, Inc.)
S2 McShield; C:\PROGRA~1\McAfee\VIRUSS~1\mcshield.exe [144704 2007-07-24] (McAfee, Inc.)
S3 McSysmon; C:\PROGRA~1\McAfee\VIRUSS~1\mcsysmon.exe [695624 2007-07-25] (McAfee, Inc.)
S2 McTaskManager; C:\Program Files\McAfee\VirusScan Enterprise\VsTskMgr.exe [54872 2007-02-22] (McAfee, Inc.)
S2 MpfService; C:\Program Files\McAfee\MPF\MPFSrv.exe [856864 2007-07-18] (McAfee, Inc.)
S2 MSK80Service; C:\Program Files\McAfee\MSK\MskSrver.exe [23880 2007-08-24] (McAfee, Inc.)
S3 NisSrv; C:\Program Files\Microsoft Security Client\Antimalware\NisSrv.exe [208944 2011-04-27] (Microsoft Corporation)
S2 RichVideo; C:\Program Files\CyberLink\Shared Files\RichVideo.exe [241734 2008-06-13] ()
S3 msiserver; %systemroot%\system32\msiexec /V [x]

==================== Drivers (Whitelisted) ====================

S3 A3AB; C:\Windows\System32\DRIVERS\A3ABv.sys [738304 2007-06-30] (D-Link Corporation)
S3 hitmanpro37; C:\Windows\system32\drivers\hitmanpro37.sys [30464 2013-05-16] ()
S2 int15; C:\Acer\Empowering Technology\eRecovery\int15.sys [15392 2007-07-02] (Acer, Inc.)
S3 LLUSBFLT; C:\Windows\System32\drivers\llusbflt.sys [4736 2005-08-03] (Laplink Software, Inc.)
S3 mfeavfk; C:\Windows\System32\drivers\mfeavfk.sys [79304 2007-07-24] (McAfee, Inc.)
S3 mfebopk; C:\Windows\System32\drivers\mfebopk.sys [35240 2007-07-21] (McAfee, Inc.)
S1 mfehidk; C:\Windows\System32\drivers\mfehidk.sys [201288 2007-07-21] (McAfee, Inc.)
S3 mferkdk; C:\Windows\System32\drivers\mferkdk.sys [33800 2007-07-24] (McAfee, Inc.)
S3 mfesmfk; C:\Windows\System32\drivers\mfesmfk.sys [40488 2007-07-21] (McAfee, Inc.)
S1 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [165648 2011-04-18] (Microsoft Corporation)
S1 MPFP; C:\Windows\System32\Drivers\Mpfp.sys [125728 2007-07-13] (McAfee, Inc.)
S3 MpNWMon; C:\Windows\System32\DRIVERS\MpNWMon.sys [43392 2011-04-18] (Microsoft Corporation)
S3 PLUsbbc2; C:\Windows\System32\Drivers\usbbc2.sys [8960 2005-08-03] (Prolific Technology Inc.)
S3 Usblink; C:\Windows\System32\Drivers\ulink.sys [37616 2003-04-18] ()
S2 zntport; C:\Windows\system32\drivers\zntport.sys [6080 2007-11-06] (Zeal SoftStudio)
S3 esgiguard; \??\C:\Program Files\Enigma Software Group\SpyHunter\esgiguard.sys [x]
S3 IntcAzAudAddService; system32\drivers\RTKVHDA.sys [x]
S3 IpInIp; system32\DRIVERS\ipinip.sys [x]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [x]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [x]
S1 SASDIFSV; \??\C:\Users\Dick\AppData\Local\Temp\SAS_SelfExtract\SASDIFSV.SYS [x]
S1 SASKUTIL; \??\C:\Users\Dick\AppData\Local\Temp\SAS_SelfExtract\SASKUTIL.SYS [x]

==================== NetSvcs (Whitelisted) ===================

==================== One Month Created Files and Folders ========

2013-05-16 10:48 - 2013-05-16 10:48 - 00000000 ____D C:\FRST
2013-05-16 09:32 - 2013-05-16 09:39 - 00030464 ____A C:\Windows\System32\Drivers\hitmanpro37.sys
2013-05-15 10:53 - 2013-05-15 10:56 - 00006869 ____A C:\Users\Dick\Desktop\attach.txt
2013-05-15 10:53 - 2013-05-15 10:55 - 00015516 ____A C:\Users\Dick\Desktop\dds.txt
2013-05-15 10:48 - 2013-05-15 10:48 - 00688992 ____R (Swearware) C:\Users\Dick\Desktop\dds.com
2013-05-14 14:21 - 2013-05-14 14:21 - 00000000 ____A C:\Windows\setuperr.log
2013-05-14 14:21 - 2013-05-14 14:21 - 00000000 ____A C:\Windows\setupact.log
2013-05-13 12:55 - 2013-05-13 12:55 - 00000000 ____D C:\Windows\ERUNT
2013-05-13 12:54 - 2013-05-14 05:42 - 00000000 ____D C:\JRT
2013-05-13 08:29 - 2013-05-13 08:29 - 00001422 ____A C:\Windows\System32\.crusader
2013-05-13 07:38 - 2013-05-13 11:36 - 00001692 ____A C:\Users\Public\Desktop\HitmanPro.lnk
2013-05-13 07:38 - 2013-05-13 07:38 - 00000000 ____D C:\Program Files\HitmanPro
2013-05-13 07:36 - 2013-05-13 08:29 - 00000000 ____D C:\ProgramData\HitmanPro
2013-05-12 06:01 - 2013-05-12 06:01 - 00174412 ____A C:\ProgramData\2433f433
2013-05-12 06:01 - 2013-05-12 06:01 - 00174395 ____A C:\Users\Dick\AppData\Roaming\2433f433
2013-05-12 06:01 - 2013-05-12 06:01 - 00174350 ____A C:\Users\Dick\AppData\Local\2433f433
2013-05-02 18:22 - 2013-05-02 18:22 - 00025600 ____A C:\Users\Dick\Desktop\Book4.xls
2013-05-02 18:22 - 2013-05-02 18:22 - 00012185 ____A C:\Users\Dick\Desktop\darrel.xlsm
2013-05-02 18:14 - 2013-05-02 18:14 - 00000000 ____D C:\Users\Dick\Downloads\To do List
2013-05-02 18:10 - 2013-05-02 18:10 - 00000000 ____D C:\Users\Dick\Documents\To do List1
2013-05-02 18:09 - 2013-05-02 18:09 - 00000000 ____D C:\Users\Dick\Documents\To do List
2013-05-02 17:51 - 2013-05-02 17:51 - 00001292 ____A C:\Users\Dick\Documents\kenyvirusList.txt
2013-05-02 16:10 - 2013-05-02 16:10 - 02237968 ____A (Kaspersky Lab ZAO) C:\Users\Dick\Desktop\tdsskiller.exe
2013-05-02 09:19 - 2013-05-02 09:21 - 00000525 ____A C:\Users\Dick\Desktop\aswMBR.lnk
2013-05-02 09:19 - 2013-05-02 09:19 - 00002466 ____A C:\Users\Dick\Documents\aswMBR.txt
2013-05-02 09:19 - 2013-05-02 09:19 - 00000512 ____A C:\Users\Dick\Documents\MBR.dat
2013-05-01 09:23 - 2013-05-01 09:24 - 02137424 ____A (Solid State Networks) C:\Users\Dick\Downloads\install_flashplayer11x32axau_mssd_aih.exe
2013-04-28 08:34 - 2013-04-29 07:47 - 00026112 ____H C:\Users\Dick\Documents\~WRL1927.tmp
2013-04-28 08:34 - 2013-04-28 10:57 - 00025600 ____H C:\Users\Dick\Documents\~WRL3180.tmp
2013-04-28 08:34 - 2013-04-28 09:55 - 00025600 ____H C:\Users\Dick\Documents\~WRL2829.tmp
2013-04-28 08:34 - 2013-04-28 09:49 - 00025600 ____H C:\Users\Dick\Documents\~WRL0529.tmp
2013-04-28 08:34 - 2013-04-28 08:53 - 00025088 ____H C:\Users\Dick\Documents\~WRL0673.tmp
2013-04-28 08:34 - 2013-04-28 08:34 - 00024576 ____H C:\Users\Dick\Documents\~WRL2798.tmp
2013-04-28 08:34 - 2013-04-28 08:34 - 00024576 ____H C:\Users\Dick\Documents\~WRL0898.tmp
2013-04-21 07:55 - 2013-04-21 07:55 - 00000000 ____D C:\TDSSKiller_Quarantine

==================== One Month Modified Files and Folders ========

2013-05-16 10:48 - 2013-05-16 10:48 - 00000000 ____D C:\FRST
2013-05-16 09:40 - 2008-03-16 12:06 - 00066682 ____A C:\Windows\System32\Config.MPF
2013-05-16 09:40 - 2006-11-02 05:01 - 00032576 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-05-16 09:40 - 2006-11-02 05:01 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-05-16 09:39 - 2013-05-16 09:32 - 00030464 ____A C:\Windows\System32\Drivers\hitmanpro37.sys
2013-05-16 09:39 - 2013-03-22 06:35 - 00026862 ____A C:\Windows\PFRO.log
2013-05-16 09:39 - 2011-12-09 07:49 - 00000878 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-05-16 09:39 - 2006-11-02 04:47 - 00003216 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2013-05-16 09:39 - 2006-11-02 04:47 - 00003216 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2013-05-16 09:33 - 2011-12-09 07:49 - 00000882 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-05-16 09:22 - 2012-04-06 08:50 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-05-16 09:16 - 2006-11-02 02:33 - 00754412 ____A C:\Windows\System32\PerfStringBackup.INI
2013-05-16 07:00 - 2007-06-27 15:30 - 00002609 ____A C:\Users\Dick\Desktop\Microsoft Office Word 2003.lnk
2013-05-16 01:25 - 2013-03-17 01:25 - 00079823 ____A C:\Windows\WindowsUpdate.log
2013-05-15 11:38 - 2012-04-06 08:50 - 00692104 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerApp.exe
2013-05-15 11:38 - 2011-05-29 11:34 - 00071048 ____A (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerCPLApp.cpl
2013-05-15 10:56 - 2013-05-15 10:53 - 00006869 ____A C:\Users\Dick\Desktop\attach.txt
2013-05-15 10:55 - 2013-05-15 10:53 - 00015516 ____A C:\Users\Dick\Desktop\dds.txt
2013-05-15 10:48 - 2013-05-15 10:48 - 00688992 ____R (Swearware) C:\Users\Dick\Desktop\dds.com
2013-05-15 00:00 - 2008-03-16 12:05 - 00000356 ____A C:\Windows\Tasks\McDefragTask.job
2013-05-14 14:21 - 2013-05-14 14:21 - 00000000 ____A C:\Windows\setuperr.log
2013-05-14 14:21 - 2013-05-14 14:21 - 00000000 ____A C:\Windows\setupact.log
2013-05-14 05:42 - 2013-05-13 12:54 - 00000000 ____D C:\JRT
2013-05-13 12:55 - 2013-05-13 12:55 - 00000000 ____D C:\Windows\ERUNT
2013-05-13 11:36 - 2013-05-13 07:38 - 00001692 ____A C:\Users\Public\Desktop\HitmanPro.lnk
2013-05-13 08:29 - 2013-05-13 08:29 - 00001422 ____A C:\Windows\System32\.crusader
2013-05-13 08:29 - 2013-05-13 07:36 - 00000000 ____D C:\ProgramData\HitmanPro
2013-05-13 07:38 - 2013-05-13 07:38 - 00000000 ____D C:\Program Files\HitmanPro
2013-05-12 15:49 - 2006-11-02 04:47 - 00027648 _____ C:\Windows\System32\umstartup.etl
2013-05-12 06:01 - 2013-05-12 06:01 - 00174412 ____A C:\ProgramData\2433f433
2013-05-12 06:01 - 2013-05-12 06:01 - 00174395 ____A C:\Users\Dick\AppData\Roaming\2433f433
2013-05-12 06:01 - 2013-05-12 06:01 - 00174350 ____A C:\Users\Dick\AppData\Local\2433f433
2013-05-03 05:31 - 2012-11-19 20:36 - 00006508 ____A C:\Users\Dick\AppData\Local\3584d114-0f5d-4af1-97f5-d82363d7ca0a.crx
2013-05-02 20:32 - 2012-11-19 19:06 - 00000000 ____D C:\Users\Dick\AppData\Roaming\Goycy
2013-05-02 18:22 - 2013-05-02 18:22 - 00025600 ____A C:\Users\Dick\Desktop\Book4.xls
2013-05-02 18:22 - 2013-05-02 18:22 - 00012185 ____A C:\Users\Dick\Desktop\darrel.xlsm
2013-05-02 18:16 - 2007-06-27 15:30 - 00002607 ____A C:\Users\Dick\Desktop\Microsoft Office Excel 2003.lnk
2013-05-02 18:14 - 2013-05-02 18:14 - 00000000 ____D C:\Users\Dick\Downloads\To do List
2013-05-02 18:10 - 2013-05-02 18:10 - 00000000 ____D C:\Users\Dick\Documents\To do List1
2013-05-02 18:09 - 2013-05-02 18:09 - 00000000 ____D C:\Users\Dick\Documents\To do List
2013-05-02 17:51 - 2013-05-02 17:51 - 00001292 ____A C:\Users\Dick\Documents\kenyvirusList.txt
2013-05-02 17:39 - 2012-11-19 19:06 - 00000000 ____D C:\Users\Dick\AppData\Roaming\Ybla
2013-05-02 16:10 - 2013-05-02 16:10 - 02237968 ____A (Kaspersky Lab ZAO) C:\Users\Dick\Desktop\tdsskiller.exe
2013-05-02 09:21 - 2013-05-02 09:19 - 00000525 ____A C:\Users\Dick\Desktop\aswMBR.lnk
2013-05-02 09:19 - 2013-05-02 09:19 - 00002466 ____A C:\Users\Dick\Documents\aswMBR.txt
2013-05-02 09:19 - 2013-05-02 09:19 - 00000512 ____A C:\Users\Dick\Documents\MBR.dat
2013-05-01 09:24 - 2013-05-01 09:23 - 02137424 ____A (Solid State Networks) C:\Users\Dick\Downloads\install_flashplayer11x32axau_mssd_aih.exe
2013-05-01 00:00 - 2008-03-16 12:05 - 00000348 ____A C:\Windows\Tasks\McQcTask.job
2013-04-29 07:47 - 2013-04-28 08:34 - 00026112 ____H C:\Users\Dick\Documents\~WRL1927.tmp
2013-04-28 10:57 - 2013-04-28 08:34 - 00025600 ____H C:\Users\Dick\Documents\~WRL3180.tmp
2013-04-28 09:55 - 2013-04-28 08:34 - 00025600 ____H C:\Users\Dick\Documents\~WRL2829.tmp
2013-04-28 09:49 - 2013-04-28 08:34 - 00025600 ____H C:\Users\Dick\Documents\~WRL0529.tmp
2013-04-28 08:53 - 2013-04-28 08:34 - 00025088 ____H C:\Users\Dick\Documents\~WRL0673.tmp
2013-04-28 08:34 - 2013-04-28 08:34 - 00024576 ____H C:\Users\Dick\Documents\~WRL2798.tmp
2013-04-28 08:34 - 2013-04-28 08:34 - 00024576 ____H C:\Users\Dick\Documents\~WRL0898.tmp
2013-04-26 17:35 - 2012-01-23 15:12 - 00000910 ____A C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2013-04-26 17:35 - 2011-03-05 16:23 - 00000000 ____D C:\Program Files\Malwarebytes' Anti-Malware
2013-04-21 07:55 - 2013-04-21 07:55 - 00000000 ____D C:\TDSSKiller_Quarantine

ZeroAccess:
C:\$Recycle.Bin\S-1-5-18\$4d70d1e71c4749c66ac7d0ff34c51024
C:\$Recycle.Bin\S-1-5-18\$4d70d1e71c4749c66ac7d0ff34c51024\@
C:\$Recycle.Bin\S-1-5-18\$4d70d1e71c4749c66ac7d0ff34c51024\L
C:\$Recycle.Bin\S-1-5-18\$4d70d1e71c4749c66ac7d0ff34c51024\U

==================== Known DLLs (Whitelisted) ============

==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================

Restore point made on: 2013-05-04 19:25:17
Restore point made on: 2013-05-05 23:00:19
Restore point made on: 2013-05-06 23:00:19
Restore point made on: 2013-05-07 23:00:18
Restore point made on: 2013-05-08 23:00:16
Restore point made on: 2013-05-09 23:00:16
Restore point made on: 2013-05-10 23:00:22
Restore point made on: 2013-05-11 23:00:25
Restore point made on: 2013-05-13 15:14:04
Restore point made on: 2013-05-14 23:00:16
Restore point made on: 2013-05-15 13:15:45

==================== Memory info ===========================

Percentage of memory in use: 14%
Total physical RAM: 1790.63 MB
Available physical RAM: 1535.07 MB
Total Pagefile: 1732.79 MB
Available Pagefile: 1598.3 MB
Total Virtual: 2047.88 MB
Available Virtual: 1975.72 MB

==================== Drives ================================

Drive c: (ACER) (Fixed) (Total:144.29 GB) (Free:83.53 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
Drive d: (DATA) (Fixed) (Total:144.04 GB) (Free:143.82 GB) NTFS
Drive f: (HITMANPRO) (Removable) (Total:7.44 GB) (Free:7.42 GB) FAT32
Drive x: (PQSERVICE) (Fixed) (Total:9.76 GB) (Free:2.29 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (Size: 298 GB) (Disk ID: 486F689A)
Partition 1: (Not Active) - (Size=10 GB) - (Type=27)
Partition 2: (Active) - (Size=144 GB) - (Type=06)
Partition 3: (Not Active) - (Size=144 GB) - (Type=07 NTFS)

========================================================
Disk: 1 (Size: 7 GB) (Disk ID: 2C42884F)
Partition 1: (Active) - (Size=7 GB) - (Type=0B)

Last Boot: 2013-05-16 00:37

==================== End Of Log ============================

 

 

SEARCH FILE****************************************************

Farbar Recovery Scan Tool (x86) Version: 14-05-2013
Ran by SYSTEM at 2013-05-16 11:06:05
Running from F:\
Boot Mode: Recovery

================== Search: "services.exe" ===================

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6002.18005_none_d14b3973ca6acc56\services.exe
[2009-09-17 01:24] - [2009-04-10 22:27] - 0279552 ____A (Microsoft Corporation) D4E6D91C1349B7BFB3599A6ADA56851B

C:\Windows\winsxs\x86_microsoft-windows-s..s-servicecontroller_31bf3856ad364e35_6.0.6001.18000_none_cf5fc067cd49010a\services.exe
[2008-01-20 18:24] - [2008-01-20 18:24] - 0279040 ____A (Microsoft Corporation) 2B336AB6286D6C81FA02CBAB914E3C6C

C:\Windows\System32\services.exe
[2009-09-17 01:24] - [2009-04-10 22:27] - 0279552 ____A (Microsoft Corporation) D4E6D91C1349B7BFB3599A6ADA56851B

C:\Windows\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\services.exe
[2008-08-04 18:49] - [2008-04-13 16:12] - 0108544 ____A (Microsoft Corporation) 0E776ED5F7CC9F94299E70461B7B8185

=== End Of Search ===



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 16 May 2013 - 02:33 PM



Hello keny1



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
HKU\Dick\...\Winlogon: [Shell] cmd.exe [ 2008-01-20] (Microsoft Corporation) <==== ATTENTION
HKU\Dick\...\Run: [Focevy] C:\Users\Dick\AppData\Roaming\Ybla\symay.exe [x]
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox] fastprox.dll ATTENTION! ====> ZeroAccess
C:\Users\Dick\AppData\Roaming\wshgf.dll
C:\Users\Dick\AppData\Roaming\Ybla\symay.exe
C:\ProgramData\2433f433
C:\Users\Dick\AppData\Roaming\2433f433
C:\Users\Dick\AppData\Local\2433f433
C:\$Recycle.Bin\S-1-5-18\$4d70d1e71c4749c66ac7d0ff34c51024

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 keny1

keny1
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:05:51 PM

Posted 16 May 2013 - 04:34 PM

Hi Gringo
Very happy with the results.  The boot seemed to take a lot of time.  The infected computer now boots to the desktop with error msg: Roaming\wshgf.dll could not be found.  The task bar is still missing some icons in the notification area, some of the icons came back.  The computer Icon is missing from the desktop. 
 
I really do not know if any files, photos or etc are lost. 
 
What should I do now?  Do you have any suggestions as to how can I prevent the virus' from being loaded?
 
Thanks Kenny Lyon 

Edited by gringo_pr, 16 May 2013 - 08:34 PM.
removed email


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 16 May 2013 - 08:35 PM



Hello keny1

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 keny1

keny1
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:05:51 PM

Posted 16 May 2013 - 09:09 PM

Hi Gringo 

The computer still boots to the error msg:   Roaming\wshgf.dll could not be found.  Thanks Kenny Lyon  kenylyon@hotmail.com

_____________

 

 

 

# AdwCleaner v2.301 - Logfile created 05/16/2013 at 18:48:33
# Updated 16/05/2013 by Xplode
# Operating system : Windows Vista ™ Home Premium Service Pack 2 (32 bits)
# User : Dick - DICK-PC
# Boot Mode : Normal
# Running from : C:\Users\Dick\Desktop\AdwCleaner.exe
# Option [Delete]

***** [Services] *****

***** [Files / Folders] *****

Folder Deleted : C:\Program Files\ParetoLogic
Folder Deleted : C:\ProgramData\ParetoLogic
Folder Deleted : C:\Users\Dick\AppData\Local\PackageAware
Folder Deleted : C:\Users\Dick\AppData\Roaming\ParetoLogic
Folder Deleted : C:\Windows\Installer\{1577A05B-EE62-4BBC-9DB7-FE748FA44EC2}

***** [Registry] *****

Key Deleted : HKCU\Software\InstallCore
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{EF99BD32-C1FB-11D2-892F-0090271D4F88}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [10]

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16450

[OK] Registry is clean.

-\\ Mozilla Firefox v9.0.1 (en-US)

File : C:\Users\Dick\AppData\Roaming\Mozilla\Firefox\Profiles\82w9mbch.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v26.0.1410.64

File : C:\Users\Dick\AppData\Local\Google\Chrome\User Data\Default\Preferences

Deleted [l.28] : search_url = "hxxp://dts.search-results.com/sr?src=crb&appid=151111&systemid=426&sr=0&q={sear[...]

*************************

AdwCleaner[R1].txt - [14193 octets] - [17/12/2012 15:30:19]
AdwCleaner[R2].txt - [1121 octets] - [18/12/2012 16:24:04]
AdwCleaner[R3].txt - [1290 octets] - [19/12/2012 11:42:31]
AdwCleaner[S1].txt - [13901 octets] - [17/12/2012 15:32:17]
AdwCleaner[S2].txt - [1279 octets] - [18/12/2012 16:25:11]
AdwCleaner[S3].txt - [1449 octets] - [19/12/2012 11:42:51]
AdwCleaner[S4].txt - [2763 octets] - [16/05/2013 18:48:33]

########## EOF - C:\AdwCleaner[S4].txt - [2823 octets] ##########

 

 

 

 

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 4.9.4 (05.06.2013:1)
OS: Windows Vista ™ Home Premium x86
Ran by Dick on Thu 05/16/2013 at 18:58:28.40
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

Suspicious HKCU\..\Run entries found. Trojan:JS/Medfos.B?

   Val Name      Type   Value Data
   ========      ====   ==========
    wshgf    REG_SZ    "C:\Windows\System32\rundll32.exe" "C:\Users\Dick\AppData\Roaming\wshgf.dll",GetMagicNumber

 

~~~ Registry Keys

 

~~~ Files

 

~~~ Folders

 

~~~ Event Viewer Logs were cleared

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Thu 05/16/2013 at 19:01:23.47
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 16 May 2013 - 09:26 PM


Hello keny1

I would not keep putting your email in the posts as it is a good way to get lots of spam

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 19 May 2013 - 03:36 PM


Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 keny1

keny1
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:05:51 PM

Posted 19 May 2013 - 04:30 PM

Hi Gringo

Att is in the process of changing our account from DSL to U-verse.  Two installation tech have visit and still no U-verse.  Monday another tech is to fix it.  I will get back to you.   Att is charging us to upgrade their equipment, does not seem fair.  Thank Kenny



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 19 May 2013 - 04:55 PM

No problem and I will see you then


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 22 May 2013 - 05:43 PM


Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 keny1

keny1
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:05:51 PM

Posted 22 May 2013 - 10:12 PM

Hi Gringo

Thanks for check on me, no additional problems with the computer.  Att changed us from Att DSL to Att U-verse, this took 4 1/2 days and four techs in four trucks.  I think I can get back with you now.  Thanks Kenny Lyon



#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:06:51 PM

Posted 22 May 2013 - 10:33 PM

OK keny1 go ahead and run combofix and lets see where we stand after that



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 keny1

keny1
  • Topic Starter

  • Members
  • 27 posts
  • OFFLINE
  •  
  • Local time:05:51 PM

Posted 23 May 2013 - 11:55 AM

Hi Gringo

I had trouble turning off the anit virus programs.  Windows defender  and Microsoft security essientials gave me an error message, like as if it they are broken.  I tried to turn off McAfee antivirus and mcAfee personal firewall but combofix stated that they are still running.  With the change from Att DSL to Att U-verse, I can not tell if there are any changes to the computer.  Thanks Kenny Lyon

----------------

ComboFix 13-05-23.02 - Dick 05/23/2013   8:50.1.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.1791.834 [GMT -7:00]
Running from: c:\users\Dick\Desktop\ComboFix.exe
AV: McAfee VirusScan *Enabled/Outdated* {2A28CCAF-2E53-0F80-A82C-9572D1C24D8C}
AV: Microsoft Security Essentials *Disabled/Updated* {108DAC43-C256-20B7-BB05-914135DA5160}
FW: McAfee Personal Firewall *Enabled* {12134D8A-643C-0ED8-8373-3C472F110AF7}
SP: McAfee VirusScan *Enabled/Updated* {91492D4B-0869-000E-929C-AE00AA450731}
SP: Microsoft Security Essentials *Disabled/Updated* {ABEC4DA7-E46C-2F39-81B5-AA334E5D1BDD}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Dick\AppData\Roaming\.#
c:\users\Dick\Documents\~WRL0002.tmp
c:\users\Dick\Documents\~WRL0003.tmp
c:\users\Dick\Documents\~WRL0004.tmp
c:\users\Dick\Documents\~WRL0005.tmp
c:\users\Dick\Documents\~WRL0006.tmp
c:\users\Dick\Documents\~WRL0130.tmp
c:\users\Dick\Documents\~WRL0197.tmp
c:\users\Dick\Documents\~WRL0241.tmp
c:\users\Dick\Documents\~WRL0252.tmp
c:\users\Dick\Documents\~WRL0322.tmp
c:\users\Dick\Documents\~WRL0347.tmp
c:\users\Dick\Documents\~WRL0503.tmp
c:\users\Dick\Documents\~WRL0529.tmp
c:\users\Dick\Documents\~WRL0673.tmp
c:\users\Dick\Documents\~WRL0686.tmp
c:\users\Dick\Documents\~WRL0898.tmp
c:\users\Dick\Documents\~WRL0976.tmp
c:\users\Dick\Documents\~WRL0993.tmp
c:\users\Dick\Documents\~WRL1085.tmp
c:\users\Dick\Documents\~WRL1128.tmp
c:\users\Dick\Documents\~WRL1144.tmp
c:\users\Dick\Documents\~WRL1150.tmp
c:\users\Dick\Documents\~WRL1185.tmp
c:\users\Dick\Documents\~WRL1205.tmp
c:\users\Dick\Documents\~WRL1260.tmp
c:\users\Dick\Documents\~WRL1355.tmp
c:\users\Dick\Documents\~WRL1384.tmp
c:\users\Dick\Documents\~WRL1410.tmp
c:\users\Dick\Documents\~WRL1431.tmp
c:\users\Dick\Documents\~WRL1433.tmp
c:\users\Dick\Documents\~WRL1691.tmp
c:\users\Dick\Documents\~WRL1731.tmp
c:\users\Dick\Documents\~WRL1779.tmp
c:\users\Dick\Documents\~WRL1848.tmp
c:\users\Dick\Documents\~WRL1927.tmp
c:\users\Dick\Documents\~WRL1965.tmp
c:\users\Dick\Documents\~WRL2007.tmp
c:\users\Dick\Documents\~WRL2059.tmp
c:\users\Dick\Documents\~WRL2285.tmp
c:\users\Dick\Documents\~WRL2355.tmp
c:\users\Dick\Documents\~WRL2408.tmp
c:\users\Dick\Documents\~WRL2410.tmp
c:\users\Dick\Documents\~WRL2476.tmp
c:\users\Dick\Documents\~WRL2594.tmp
c:\users\Dick\Documents\~WRL2692.tmp
c:\users\Dick\Documents\~WRL2784.tmp
c:\users\Dick\Documents\~WRL2798.tmp
c:\users\Dick\Documents\~WRL2799.tmp
c:\users\Dick\Documents\~WRL2829.tmp
c:\users\Dick\Documents\~WRL2954.tmp
c:\users\Dick\Documents\~WRL2962.tmp
c:\users\Dick\Documents\~WRL3157.tmp
c:\users\Dick\Documents\~WRL3180.tmp
c:\users\Dick\Documents\~WRL3300.tmp
c:\users\Dick\Documents\~WRL3324.tmp
c:\users\Dick\Documents\~WRL3327.tmp
c:\users\Dick\Documents\~WRL3527.tmp
c:\users\Dick\Documents\~WRL3534.tmp
c:\users\Dick\Documents\~WRL3600.tmp
c:\users\Dick\Documents\~WRL3650.tmp
c:\users\Dick\Documents\~WRL3747.tmp
c:\users\Dick\Documents\~WRL3846.tmp
c:\users\Dick\Documents\~WRL3877.tmp
c:\windows\system32\URTTemp
c:\windows\system32\URTTemp\fusion.dll
c:\windows\system32\URTTemp\mscoree.dll
c:\windows\system32\URTTemp\mscoree.dll.local
c:\windows\system32\URTTemp\mscorsn.dll
c:\windows\system32\URTTemp\mscorwks.dll
c:\windows\system32\URTTemp\msvcr71.dll
c:\windows\system32\URTTemp\regtlib.exe
D:\install.exe
.
.
(((((((((((((((((((((((((   Files Created from 2013-04-23 to 2013-05-23  )))))))))))))))))))))))))))))))
.
.
2013-05-23 15:59 . 2013-05-23 16:00 -------- d-----w- c:\windows\ServiceProfiles\LocalService\AppData\Local\temp
2013-05-23 15:59 . 2013-05-23 15:59 -------- d-----w- c:\windows\system32\config\systemprofile\AppData\Local\temp
2013-05-23 15:59 . 2013-05-23 15:59 -------- d-----w- c:\windows\ServiceProfiles\NetworkService\AppData\Local\temp
2013-05-16 18:48 . 2013-05-16 18:48 -------- d-----w- C:\FRST
2013-05-13 20:55 . 2013-05-13 20:55 -------- d-----w- c:\windows\ERUNT
2013-05-13 20:54 . 2013-05-17 01:58 -------- d-----w- C:\JRT
2013-05-13 15:38 . 2013-05-13 15:38 -------- d-----w- c:\program files\HitmanPro
2013-05-13 15:36 . 2013-05-13 16:29 -------- d-----w- c:\programdata\HitmanPro
2013-05-10 07:57 . 2013-05-10 07:57 187456 ----a-w- c:\program files\Mozilla Firefox\plugins\nppdf32.dll
2013-05-10 07:57 . 2013-05-10 07:57 187456 ----a-w- c:\program files\Internet Explorer\Plugins\nppdf32.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-05-15 19:38 . 2012-04-06 16:50 692104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-05-15 19:38 . 2011-05-29 19:34 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-04-04 21:50 . 2011-03-06 00:23 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2012-02-22 15:20 . 2011-12-20 17:05 121816 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[-] 2008-04-14 . D8849F77C0B66226335A59D26CB4EDC6 . 167936 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\appmgmts.dll
[-] 2004-08-04 . 9C3C12975C97119412802B181FBEEFFE . 167936 . . [5.1.2600.2180] . . c:\windows\System32\appmgmts.dll
.
[-] 2008-04-14 . 986B1FF5814366D71E0AC5755C88F2D3 . 33792 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\msgsvc.dll
[-] 2004-08-04 . 95FD808E4AC22ABA025A7B3EAC0375D2 . 33792 . . [5.1.2600.2180] . . c:\windows\System32\msgsvc.dll
.
[-] 2008-04-14 00:12 . C7E39EA41233E9F5B86C8DA3A9F1E4A8 . 52224 . . [9.0.1.56] . . c:\windows\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\mspmsnsv.dll
[-] 2004-08-04 07:56 . C086483E3DBA8C1C0A687EC8D5B3D4C1 . 52224 . . [9.0.1.56] . . c:\windows\System32\mspmsnsv.dll
.
[-] 2008-04-14 00:12 . 156F64A3345BD23C600655FB4D10BC08 . 435200 . . [5.1.2400.5512] . . c:\windows\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\ntmssvc.dll
[7] 2008-01-21 . A7DFF9642D510BE1EEC6664CD0369953 . 460288 . . [6.0.6001.18000] . . c:\windows\winsxs\x86_microsoft-windows-r..emanagement-service_31bf3856ad364e35_6.0.6001.18000_none_0e3e31f00e12b007\ntmssvc.dll
[-] 2004-08-04 07:56 . B62F29C00AC55A761B2E45877D85EA0F . 435200 . . [5.1.2400.2180] . . c:\windows\System32\ntmssvc.dll
.
[-] 2008-04-14 . 3805DF0AC4296A34BA4BF93B346CC378 . 171008 . . [5.1.2600.5512] . . c:\windows\SoftwareDistribution\Download\dd9ab5193501484cf5e6884fa1d22f9e\srsvc.dll
[-] 2004-08-04 . 92BDF74F12D6CBEC43C94D4B7F804838 . 170496 . . [5.1.2600.2180] . . c:\windows\System32\srsvc.dll
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
"Yahoo! Pager"="c:\program files\Yahoo!\Messenger\YahooMessenger.exe" [2007-08-31 4670704]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Acer Empowering Technology Monitor"="c:\acer\Empowering Technology\SysMonitor.exe" [2008-01-10 326176]
"eDataSecurity Loader"="c:\acer\Empowering Technology\eDataSecurity\x86\eDSloader.exe" [2008-03-05 526896]
"mcagent_exe"="c:\program files\McAfee.com\Agent\mcagent.exe" [2007-08-04 582992]
"NvSvc"="c:\windows\system32\nvsvc.dll" [2007-12-21 86016]
"SMSERIAL"="c:\program files\Motorola\SMSERIAL\sm56hlpr.exe" [2007-02-02 630784]
"Acer Product Registration"="c:\program files\Acer Registration\ACE1.exe" [2007-10-15 3387392]
"Acer Assist Launcher"="c:\program files\Acer Assist\launcher.exe" [2007-02-02 1261568]
"NVRaidService"="c:\windows\system32\nvraidservice.exe" [2007-12-07 196128]
"D-Link Wireless G WDA-1320"="c:\program files\D-Link\Wireless G WDA-1320\AirGCFG.exe" [2007-08-29 1662976]
"ANIWZCS2Service"="c:\program files\ANI\ANIWZCS2 Service\WZCSLDR2.exe" [2007-01-19 49152]
"McAfeeUpdaterUI"="c:\program files\McAfee\Common Framework\UdaterUI.exe" [2006-12-19 136768]
"PCMMediaSharing"="c:\program files\Acer Arcade Live\Acer HomeMedia Connect\Kernel\DMS\PCMMediaSharing.exe" [2008-05-21 204908]
"DivXUpdate"="c:\program files\DivX\DivX Update\DivXUpdate.exe" [2011-07-28 1259376]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2013-01-28 59720]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2013-02-20 152392]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2008-3-25 214360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37Crusader]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37CrusaderBoot]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\mcmscsvc]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MCODS]
@=""
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
S2 Acer HomeMedia Connect Service;Acer HomeMedia Connect Service;c:\program files\Acer Arcade Live\Acer HomeMedia Connect\Kernel\DMS\CLMSServer.exe [x]
S3 A3AB;D-Link AirPro 802.11a/b Wireless Adapter Service(A3AB);c:\windows\system32\DRIVERS\A3ABv.sys [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
HPZ12 REG_MULTI_SZ    Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ    hpqcxs08 hpqddsvc
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-04-10 11:28 1642448 ----a-w- c:\program files\Google\Chrome\Application\26.0.1410.64\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-05-23 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-06 19:38]
.
2013-05-23 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-12-09 15:49]
.
2013-05-23 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-12-09 15:49]
.
2013-05-15 c:\windows\Tasks\McDefragTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2008-09-03 20:32]
.
2013-05-01 c:\windows\Tasks\McQcTask.job
- c:\progra~1\mcafee\mqc\QcConsol.exe [2008-09-03 20:32]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://att.net/
uSearchMigratedDefaultURL = hxxp://search.yahoo.com/search?p={searchTerms}&ei=utf-8&fr=b1ie7
mStart Page = hxxp://en.us.acer.yahoo.com
mSearch Bar = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/sb/sbcydsl/*http://www.yahoo.com/search/ie.html
uInternet Settings,ProxyOverride = *.local
uSearchURL,(Default) = hxxp://red.clientapps.yahoo.com/customize/ie/defaults/su/sbcydsl/*http://www.yahoo.com
TCP: DhcpNameServer = 192.168.1.254
DPF: Microsoft XML Parser for Java - file://c:\windows\Java\classes\xmldso.cab
FF - ProfilePath - c:\users\Dick\AppData\Roaming\Mozilla\Firefox\Profiles\82w9mbch.default\
FF - ExtSQL: !HIDDEN! 2013-05-01 10:16; {3584d114-0f5d-4af1-97f5-d82363d7ca0a}; c:\users\Dick\AppData\Roaming\Mozilla\Firefox\Profiles\82w9mbch.default\extensions\{3584d114-0f5d-4af1-97f5-d82363d7ca0a}.xpi
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-wshgf - c:\users\Dick\AppData\Roaming\wshgf.dll
SafeBoot-MsMpSvc
AddRemove-{09FF4DB8-7DE9-4D47-B7DB-915DB7D9A8CA} - c:\programdata\{83C3B2FD-37EA-4C06-A228-E9B5E32FF0B1}\bm_installer.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-05-23 09:06
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_202_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_7_700_202_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
------------------------ Other Running Processes ------------------------
.
c:\acer\Empowering Technology\ePerformance\MemCheck.exe
c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\acer\Empowering Technology\eDataSecurity\x86\eDSService.exe
c:\program files\Common Files\LightScribe\LSSrvc.exe
c:\program files\McAfee\SiteAdvisor\McSACore.exe
c:\progra~1\COMMON~1\mcafee\mcproxy\mcproxy.exe
c:\windows\system32\rundll32.exe
c:\progra~1\McAfee\VIRUSS~1\mcshield.exe
c:\program files\McAfee\VirusScan Enterprise\VsTskMgr.exe
c:\program files\McAfee\MPF\MPFSrv.exe
c:\program files\McAfee\MSK\MskSrver.exe
c:\program files\CyberLink\Shared Files\RichVideo.exe
c:\program files\Yahoo!\SoftwareUpdate\YahooAUService.exe
c:\acer\Empowering Technology\eRecovery\eRecoveryService.exe
c:\acer\Empowering Technology\eSettings\Service\capuserv.exe
c:\windows\system32\WUDFHost.exe
c:\progra~1\McAfee\MSC\mcmscsvc.exe
c:\progra~1\McAfee.com\Agent\mcagent.exe
c:\windows\System32\rundll32.exe
c:\windows\system32\wbem\unsecapp.exe
c:\windows\ehome\ehmsas.exe
c:\program files\McAfee\Common Framework\McTray.exe
c:\program files\iPod\bin\iPodService.exe
c:\program files\Yahoo!\Messenger\ymsgr_tray.exe
c:\program files\HP\Digital Imaging\bin\hpqSTE08.exe
c:\program files\HP\Digital Imaging\bin\hpqbam08.exe
c:\program files\HP\Digital Imaging\Product Assistant\bin\hprblog.exe
c:\progra~1\COMMON~1\mcafee\mna\mcnasvc.exe
c:\progra~1\mcafee\msc\mcuimgr.exe
c:\program files\HitmanPro\hmpsched.exe
c:\program files\HitmanPro\HitmanPro.exe
c:\windows\system32\vssvc.exe
c:\windows\servicing\TrustedInstaller.exe
c:\windows\system32\consent.exe
.
**************************************************************************
.
Completion time: 2013-05-23  09:12:37 - machine was rebooted
ComboFix-quarantined-files.txt  2013-05-23 16:12
.
Pre-Run: 91,302,260,736 bytes free
Post-Run: 91,162,398,720 bytes free
.
- - End Of File - - 7C0EE6AD0356C3E961FE0F31C3F34C29
 






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users