Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected By Fake Flash Update


  • This topic is locked This topic is locked
40 replies to this topic

#1 noeltelling

noeltelling

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 01 June 2013 - 04:40 PM

I accidentally installed a fake flash update. Now there are numerous ad blocks added to every site I visit no matter what browser I use (Explorer, Firefox & Chrome)

 

I ran malwarebytes and spybot but they couldn't remove the infection. Any help would be appreciated.

 

Thank you.

 

DDS (Ver_2012-11-20.01) - NTFS_x86 
Internet Explorer: 8.0.6001.18702  BrowserJavaVersion: 10.9.2
Run by Paul at 14:07:36 on 2013-06-01
Microsoft Windows XP Professional  5.1.2600.3.1252.1.1033.18.2038.154 [GMT -7:00]
.
AV: AVG Anti-Virus Free Edition 2012 *Enabled/Updated* {17DDD097-36FF-435F-9E1B-52D74245D6BF}
AV: Norton Security Suite *Enabled/Updated* {E10A9785-9598-4754-B552-92431C1C35F8}
FW: Norton Security Suite *Enabled* 
.
============== Running Processes ================
.
C:\Program Files\IObit\Advanced SystemCare 6\ASCService.exe
C:\Program Files\Intel\Wireless\Bin\S24EvMon.exe
C:\WINDOWS\System32\WLTRYSVC.EXE
C:\WINDOWS\System32\bcmwltry.exe
C:\WINDOWS\system32\spoolsv.exe
C:\Program Files\IObit\IObit Malware Fighter\IMFsrv.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Intel\Wireless\Bin\EvtEng.exe
C:\WINDOWS\Microsoft.NET\Framework\v3.0\WPF\PresentationFontCache.exe
C:\WINDOWS\Explorer.EXE
C:\Program Files\Java\jre7\bin\jqs.exe
C:\Program Files\Micro Niche Finder\srvany.exe
C:\Program Files\Micro Niche Finder\bggoogle.exe
C:\Program Files\Norton Security Suite\Engine\20.3.1.22\ccSvcHst.exe
C:\Program Files\Intel\Wireless\Bin\RegSrvc.exe
C:\Program Files\Sandboxie\SbieSvc.exe
C:\Program Files\Intel\Wireless\Bin\WLKeeper.exe
C:\WINDOWS\system32\SearchIndexer.exe
C:\PROGRAM FILES\SIBER SYSTEMS\AI ROBOFORM\ROBOTASKBARICON.EXE
C:\PROGRAM FILES\SPYBOT - SEARCH & DESTROY\TEATIMER.EXE
C:\PROGRAM FILES\SYNAPTICS\SYNTP\SYNTPENH.EXE
C:\PROGRAM FILES\COMMON FILES\JAVA\JAVA UPDATE\JUSCHED.EXE
C:\Program Files\Hosts_Anti_Adwares_PUPs\HOSTS_Anti-Adware_main.exe
C:\Program Files\ProxyFirewall\ProxyFirewall.exe
C:\WINDOWS\system32\ctfmon.exe
C:\Program Files\IObit\Advanced SystemCare 6\ASCTray.exe
C:\PROGRAM FILES\UTORRENT\UTORRENT.EXE
C:\PROGRAM FILES\MICROSOFT OFFICE\OFFICE12\GROOVEMONITOR.EXE
C:\WINDOWS\SYSTEM32\HKCMD.EXE
C:\WINDOWS\System32\alg.exe
C:\Documents and Settings\Paul\Application Data\Dropbox\bin\Dropbox.exe
C:\Program Files\IObit\IObit Malware Fighter\IMF.exe
C:\Program Files\Norton Security Suite\Engine\20.3.1.22\ccSvcHst.exe
C:\Program Files\Intel\Wireless\Bin\iFrmewrk.exe
C:\Program Files\Intel\Wireless\Bin\Dot1XCfg.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\wuauclt.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k imgsvc
C:\WINDOWS\system32\svchost.exe -k netsvcs
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com/
BHO: Spybot-S&D IE Protection: {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - <orphaned>
BHO: Norton Identity Protection: {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - c:\program files\norton security suite\engine\20.3.1.22\coieplg.dll
BHO: Norton Vulnerability Protection: {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - c:\program files\norton security suite\engine\20.3.1.22\ips\ipsbho.dll
BHO: RoboForm Toolbar Helper: {724d43a9-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\roboform.dll
BHO: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Skype Plug-In: {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
BHO: Advanced SystemCare Browser Protection: {BA0C978D-D909-49B6-AFE2-8BDE245DC7E6} - c:\program files\iobit\advanced systemcare 6\browerprotect\ASCPlugin_Protection.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
TB: &RoboForm Toolbar: {724D43A0-0D85-11D4-9908-00400523E39A} - c:\program files\siber systems\ai roboform\roboform.dll
TB: &RoboForm Toolbar: {724d43a0-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\roboform.dll
TB: Norton Toolbar: {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - c:\program files\norton security suite\engine\20.3.1.22\coieplg.dll
uRun: [ProxyFirewall] c:\program files\proxyfirewall\ProxyFirewall.exe
uRun: [ctfmon.exe] c:\windows\system32\ctfmon.exe
uRun: [Advanced SystemCare 6] "c:\program files\iobit\advanced systemcare 6\ASCTray.exe" /AutoStart
uRun: [uTorrent] "c:\program files\utorrent\UTORRENT.EXE"  /MINIMIZED
uRun: [GoogleChromeAutoLaunch_4066CE30C78D1E4B1BD69DDE613E36F3] "c:\program files\google\chrome\application\chrome.exe" --no-startup-window
mRun: [QuickTime Task] "c:\program files\quicktime\qttask.exe" -atboottime
mRun: [IObit Malware Fighter] "c:\program files\iobit\iobit malware fighter\IMF.exe" /autostart
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [HOSTS Anti-Adware_PUPs] c:\program files\hosts_anti_adwares_pups\HOSTS_Anti-Adware_main.exe
dRun: [RoboForm] "c:\program files\siber systems\ai roboform\RoboTaskBarIcon.exe"
StartupFolder: c:\docume~1\paul\startm~1\programs\startup\dropbox.lnk - c:\documents and settings\paul\application data\dropbox\bin\Dropbox.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:323
uPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Windows\System: Allow-LogonScript-NetbiosDisabled = dword:1
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
IE: Customize Menu - c:\program files\siber systems\ai roboform\RoboFormComCustomizeIEMenu.html
IE: Download with Mipony - c:\program files\mipony\browser\IEContext.htm
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000
IE: Fill Forms - c:\program files\siber systems\ai roboform\RoboFormComFillForms.html
IE: Save Forms - c:\program files\siber systems\ai roboform\RoboFormComSavePass.html
IE: Show RoboForm Toolbar - c:\program files\siber systems\ai roboform\RoboFormComShowToolbar.html
IE: {219C3416-8CB2-491a-A3C7-D9FCDDC9D600} - {5F7B1267-94A9-47F5-98DB-E99415F33AEC} - c:\program files\windows live\writer\WriterBrowserExtension.dll
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F46} - {320AF880-6646-11D3-ABEE-C5DBF3571F46} - c:\program files\siber systems\ai roboform\roboform.dll
IE: {320AF880-6646-11D3-ABEE-C5DBF3571F49} - {320AF880-6646-11D3-ABEE-C5DBF3571F49} - c:\program files\siber systems\ai roboform\roboform.dll
IE: {724d43aa-0d85-11d4-9908-00400523e39a} - {724d43aa-0d85-11d4-9908-00400523e39a} - c:\program files\siber systems\ai roboform\roboform.dll
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
.
INFO: HKCU has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
.
INFO: HKLM has more than 50 listed domains.
   If you wish to scan all of them, select the 'Force scan all domains' option.
.
DPF: {17492023-C23A-453E-A040-C7C580BBF700} - hxxp://download.microsoft.com/download/C/0/C/C0CBBA88-A6F2-48D9-9B0E-1719D1177202/LegitCheckControl.cab
DPF: {362C56AA-6E4F-40C7-A0B5-85501DBDAD77} - hxxp://i.dell.com/images/global/js/scanner/SysProExe.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0031-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_31-windows-i586.cab
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{910B8335-880D-4B58-ABF3-A3295CDB6FF7} : DHCPNameServer = 192.168.1.1
TCP: Interfaces\{F2FD75C3-35F2-487A-A3C4-9E20EF3340DF} : DHCPNameServer = 68.87.69.146 68.87.85.98 68.87.78.130
Handler: belarc - {6318E0AB-2E93-11D1-B8ED-00608CC9A71F} - c:\program files\belarc\advisor\system\BAVoilaX.dll
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\program files\common files\skype\Skype4COM.dll
Notify: igfxcui - igfxdev.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook - {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: Windows Desktop Search Namespace Manager - {56F9679E-7826-4C84-81F3-532071A8BCC5} - c:\program files\windows desktop search\MSNLNamespaceMgr.dll
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\27.0.1453.94\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
Hosts: 127.0.0.1 mpa.one.microsoft.com
Hosts: 127.0.0.1 www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\paul\application data\mozilla\firefox\profiles\07kmntif.default\
FF - prefs.js: browser.search.selectedEngine - Amazon.com
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: network.proxy.type - 0
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\k-lite codec pack\real\browser\plugins\nppl3260.dll
FF - plugin: c:\program files\k-lite codec pack\real\browser\plugins\nprpjplug.dll
FF - plugin: c:\program files\microsoft silverlight\5.1.20125.0\npctrlui.dll
FF - plugin: c:\program files\microsoft\office live\npOLW.dll
FF - plugin: c:\program files\windows live\photo gallery\NPWLPG.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_7_700_202.dll
FF - plugin: c:\windows\system32\npDeployJava1.dll
FF - plugin: c:\windows\system32\npptools.dll
FF - ExtSQL: 2013-04-12 19:12; {BBDA0591-3099-440a-AA10-41764D9DB4DB}; c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_20.1.0.24\IPSFFPlgn
FF - ExtSQL: 2013-04-12 19:39; {2D3F3651-74B9-4795-BDEC-6DA2F431CB62}; c:\documents and settings\all users\application data\norton\{0c55c096-0f1d-4f28-aaa2-85ef591126e7}\n360_20.1.0.24\coFFPlgn
FF - ExtSQL: 2013-05-18 04:44; {FA8E1202-A0A1-4CB3-BCE6-55F1C233A4DD}; c:\documents and settings\paul\application data\mozilla\firefox\profiles\07kmntif.default\extensions\{FA8E1202-A0A1-4CB3-BCE6-55F1C233A4DD}
FF - ExtSQL: 2013-05-19 06:50; ascsurfingprotection@iobit.com; c:\documents and settings\paul\application data\mozilla\firefox\profiles\07kmntif.default\extensions\ascsurfingprotection@iobit.com
.
============= SERVICES / DRIVERS ===============
.
.
=============== File Associations ===============
.
ShellExec: MiPony.exe: open="c:\program files\mipony\MiPony.exe""%1"
.
=============== Created Last 30 ================
.
2013-05-28 04:04:34 -------- d-----w- c:\program files\ESET
2013-05-28 02:49:11 -------- d-----w- c:\program files\Hosts_Anti_Adwares_PUPs
2013-05-25 01:11:46 -------- d-----w- c:\windows\ERUNT
2013-05-25 01:11:27 -------- d-----w- C:\JRT
2013-05-24 07:08:12 12872 ----a-w- c:\windows\system32\bootdelete.exe
2013-05-24 06:34:41 -------- d-----w- c:\documents and settings\all users\application data\HitmanPro
2013-05-19 01:52:06 12928 -c----w- c:\windows\system32\dllcache\usb8023x.sys
2013-05-19 01:52:06 12928 -c----w- c:\windows\system32\dllcache\usb8023.sys
2013-05-18 12:16:50 74136 ----a-w- c:\program files\mozilla firefox\breakpadinjector.dll
2013-05-18 12:16:50 262552 ----a-w- c:\program files\mozilla firefox\browser\components\browsercomps.dll
2013-05-17 03:43:06 394656 ----a-r- c:\windows\system32\drivers\n360\1403010.016\symtdi.sys
2013-05-17 03:43:06 350368 ----a-r- c:\windows\system32\drivers\n360\1403010.016\symtdiv.sys
2013-05-17 03:43:06 338592 ----a-r- c:\windows\system32\drivers\n360\1403010.016\symnets.sys
2013-05-17 03:43:05 934488 ----a-w- c:\windows\system32\drivers\n360\1403010.016\symefa.sys
2013-05-17 03:43:05 367704 ----a-w- c:\windows\system32\drivers\n360\1403010.016\symds.sys
2013-05-17 03:43:05 21400 ----a-r- c:\windows\system32\drivers\n360\1403010.016\symelam.sys
2013-05-17 03:43:04 602712 ----a-w- c:\windows\system32\drivers\n360\1403010.016\srtsp.sys
2013-05-17 03:43:04 32344 ----a-w- c:\windows\system32\drivers\n360\1403010.016\srtspx.sys
2013-05-17 03:43:04 175264 ----a-r- c:\windows\system32\drivers\n360\1403010.016\ironx86.sys
2013-05-17 03:43:04 134304 ----a-w- c:\windows\system32\drivers\n360\1403010.016\ccsetx86.sys
2013-05-17 03:41:25 14818 ----a-w- c:\windows\system32\drivers\n360\1403010.016\symvtcer.dat
2013-05-17 03:41:24 -------- d-----w- c:\windows\system32\drivers\n360\1403010.016
2013-05-10 07:57:26 187456 ----a-w- c:\program files\mozilla firefox\plugins\nppdf32.dll
2013-05-10 07:57:26 187456 ----a-w- c:\program files\internet explorer\plugins\nppdf32.dll
2013-05-04 18:59:04 26520 ----a-w- c:\program files\mozilla firefox\plugin-hang-ui.exe
.
==================== Find3M  ====================
.
2013-05-16 04:30:27 692104 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-05-16 04:30:26 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-04-16 22:17:15 920064 ----a-w- c:\windows\system32\wininet.dll
2013-04-16 22:17:14 43520 ------w- c:\windows\system32\licmgr10.dll
2013-04-16 22:17:14 1469440 ------w- c:\windows\system32\inetcpl.cpl
2013-04-12 23:28:55 385024 ------w- c:\windows\system32\html.iec
2013-04-10 01:31:19 1876352 ----a-w- c:\windows\system32\win32k.sys
2013-04-04 21:50:32 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-04-03 02:00:00 142496 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS
2013-03-08 08:36:22 293376 ----a-w- c:\windows\system32\winsrv.dll
2013-03-07 01:32:25 2149888 ----a-w- c:\windows\system32\ntoskrnl.exe
2013-03-07 00:50:30 2028544 ----a-w- c:\windows\system32\ntkrnlpa.exe
.
============= FINISH: 14:12:26.78 ===============
 

 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:11 AM

Posted 03 June 2013 - 02:37 AM

Hello noeltelling

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!
  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo

Edited by gringo_pr, 03 June 2013 - 02:37 AM.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 noeltelling

noeltelling
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 03 June 2013 - 11:50 PM

Ok, I ran AdwCleaner & JRT. I am still infected though. This malware is quite persistent. 

 

Here are my log files:

 

 

# AdwCleaner v2.301 - Logfile created 06/03/2013 at 20:26:20
# Updated 16/05/2013 by Xplode
# Operating system : Microsoft Windows XP Service Pack 3 (32 bits)
# User : Paul - E1505
# Boot Mode : Normal
# Running from : C:\Documents and Settings\Paul\Desktop\AdwCleaner.exe
# Option [Delete]

***** [Services] *****

***** [Files / Folders] *****

***** [Registry] *****

***** [Internet Browsers] *****

-\\ Internet Explorer v8.0.6001.18702

[OK] Registry is clean.

-\\ Mozilla Firefox v13.0.1 (en-US)

File : C:\Documents and Settings\Paul\Application Data\Mozilla\Firefox\Profiles\07kmntif.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v27.0.1453.94

File : C:\Documents and Settings\Paul\Local Settings\Application Data\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [16087 octets] - [21/05/2013 20:09:21]
AdwCleaner[R2].txt - [1315 octets] - [23/05/2013 20:02:16]
AdwCleaner[R3].txt - [1311 octets] - [24/05/2013 01:37:24]
AdwCleaner[R4].txt - [1427 octets] - [24/05/2013 17:48:23]
AdwCleaner[R5].txt - [1542 octets] - [27/05/2013 19:26:22]
AdwCleaner[R6].txt - [1602 octets] - [27/05/2013 19:28:55]
AdwCleaner[R7].txt - [1487 octets] - [27/05/2013 22:25:37]
AdwCleaner[R8].txt - [1782 octets] - [03/06/2013 20:22:44]
AdwCleaner[S1].txt - [16482 octets] - [21/05/2013 20:30:45]
AdwCleaner[S2].txt - [1381 octets] - [23/05/2013 20:03:34]
AdwCleaner[S3].txt - [1375 octets] - [24/05/2013 01:38:31]
AdwCleaner[S4].txt - [1606 octets] - [24/05/2013 17:49:27]
AdwCleaner[S5].txt - [1666 octets] - [27/05/2013 19:29:28]
AdwCleaner[S6].txt - [1547 octets] - [27/05/2013 22:27:02]
AdwCleaner[S7].txt - [1713 octets] - [03/06/2013 20:26:20]

########## EOF - C:\AdwCleaner[S7].txt - [1773 octets] ##########

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 4.9.4 (05.06.2013:1)
OS: Microsoft Windows XP x86
Ran by Paul on Mon 06/03/2013 at 21:16:38.01
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

 

~~~ Registry Keys

 

~~~ Files

 

~~~ Folders

 

~~~ FireFox

Emptied folder: C:\Documents and Settings\Paul\Application Data\mozilla\firefox\profiles\07kmntif.default\minidumps [5 files]

 

~~~ Chrome

Successfully deleted: [Registry Key] hkey_current_user\software\policies\google\chrome\extensioninstallforcelist
Successfully deleted: [Registry Key] hkey_local_machine\software\policies\google\chrome\extensioninstallforcelist
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\lkpmjnommfoljgjbckjmjhkmnhfmcmon

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 06/03/2013 at 21:23:18.40
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:11 AM

Posted 04 June 2013 - 09:48 AM


Hello noeltelling

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 noeltelling

noeltelling
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 04 June 2013 - 10:57 PM

I ran Combofix and it said I had to disable Free AVG 2012.

 

I uninstalled that awhile back. I double checked and don't see AVG installed anywhere.

 

I shut down my computer and didn't proceed with combofix at that point since it warned not to.



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:11 AM

Posted 05 June 2013 - 09:10 AM

Go ahead and continue I will remove that later


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 noeltelling

noeltelling
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 06 June 2013 - 03:10 AM

Ok, I ran Cobofix. This time it didn't say AVG was running.

 

Eventually it popped up a blank log.

 

I rebooted and now Windows is asking for a password which it never did before.

 

I tried a few passwords I use a lot but none of them worked. Oh, I tried just pressing enter too but that didn't work either.

 

I'm not sure what to do now. I seemed to be locked out.



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:11 AM

Posted 06 June 2013 - 09:22 PM

Try going into safe mode.

I have not heard of this happening before


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 noeltelling

noeltelling
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 06 June 2013 - 10:06 PM

It asks for a password trying to go into safe mode as well.

 

I do have access to the Recovery Console that Combofix installed when I boot up though.



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:11 AM

Posted 06 June 2013 - 11:27 PM

Try this please. You will need a USB drive.

Download http://unetbootin.sourceforge.net/unetbootin-xpud-windows-latest.exe & http://noahdfear.net/downloads/bootable/xPUD/xpud-0.9.2.iso to the desktop of your clean computer
  • Insert your USB drive
  • Press Start > My Computer > right click your USB drive > choose Format > Quick format
  • Double click the unetbootin-xpud-windows-387.exe that you just downloaded
  • Press Run then OK
  • Select the DiskImage option then click the browse button located on the right side of the textbox field.
  • Browse to and select the xpud-0.9.2.iso file you downloaded
  • Verify the correct drive letter is selected for your USB device then click OK
  • It will install a little bootable OS on your USB device
  • Once the files have been written to the device you will be prompted to reboot ~ do not reboot and instead just Exit the UNetbootin interface
  • After it has completed do not choose to reboot the clean computer simply close the installer
  • Next download http://noahdfear.net/downloads/driver.sh to your USB
  • Remove the USB and insert it in the sick computer
  • Boot the Sick computer
  • Press F12 and choose to boot from the USB
  • Follow the prompts
  • A Welcome to xPUD screen will appear
  • Press File
  • Expand mnt
  • sda1,2...usually corresponds to your HDD
  • sdb1 is likely your USB
  • Click on the folder that represents your USB drive (sdb1 ?)
  • Confirm that you see driver.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash driver.sh
  • Press Enter
  • After it has finished a report will be located on your USB drive named report.txt
  • Remove the USB drive and insert back in your working computer and navigate to report.txt

    Please note - all text entries are case sensitive
Copy and paste the report.txt for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 noeltelling

noeltelling
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 07 June 2013 - 08:25 PM

Ok, Here's the report:

 

Fri Jun 7 18:16:51 UTC 2013
Driver report for /mnt/sda1/WINDOWS/system32/drivers
5d7be7b19e827125e016325334e58ff1 BANTExt.sys has NO Company Name! N360/1403010.016/ccsetx86.sys has NO Company Name! N360/1403010.016/ironx86.sys has NO Company Name! N360/1403010.016/srtsp.sys has NO Company Name! N360/1403010.016/srtspx.sys has NO Company Name! N360/1403010.016/symds.sys has NO Company Name! N360/1403010.016/symefa.sys has NO Company Name! N360/1403010.016/symelam.sys has NO Company Name! N360/1403010.016/symnets.sys has NO Company Name! N360/1403010.016/symtdi.sys has NO Company Name! N360/1403010.016/symtdiv.sys has NO Company Name!
14bb60a4f1c5291217a05d5728c403e6 SmartDefragDriver.sys has NO Company Name!
e57b778208c783d8debab320c16a1b82 StarOpen.sys has NO Company Name!

c1536905ad2067812a238bce998f4bff  1394bus.sys
Microsoft Corporation

9859c0f6936e723e4892d7141b1327d5  acpiec.sys
Microsoft Corporation

8fd99680a539792a30e97944fdaecf17  acpi.sys
Microsoft Corporation

8bed39e3c35d6a489438b8141717a557  aec.sys
Microsoft Corporation

023867b6606fbabcdd52e089c4a507da  AegisP.sys
Cisco Systems

1e44bc1e83d8fd2305f8d452db109cf9  afd.sys
Microsoft Corporation

08fd04aa961bdc77fb983f328334e3d7  agp440.sys
Microsoft Corporation

03a7e0922acfe1b07d5db2eeb0773063  agpcpq.sys
Microsoft Corporation

cb08aed0de2dd889a8a820cd8082d83c  alim1541.sys
Microsoft Corporation

95b4fb835e28aa1336ceeb07fd5b9398  amdagp.sys
Advanced Micro Devices

d7701d7e72243286cc88c9973d891057  amdk6.sys
Microsoft Corporation

8fce268cdbdd83b23419d1f35f42c7b1  amdk7.sys
Microsoft Corporation

b5b8a80875c1dededa8b02765642c32f  arp1394.sys
Microsoft Corporation

b153affac761e7f5fcfa822b9c4e97bc  asyncmac.sys
Microsoft Corporation

9f3a2f5aa6875c72bf062c712cfa2674  atapi.sys
Microsoft Corporation

d649c57da6fa762c64013747e5d7d2d6  ati1btxx.sys
ATI Technologies

60b6aa2dc1521da343f781b70eb7895a  ati1mdxx.sys
ATI Technologies

6fdc61e8e8e17f6ecc2d9a10fa8df347  ati1pdxx.sys
ATI Technologies

9d318099bf3876a4af4bc75966d27603  ati1raxx.sys
ATI Technologies

bcaf267b10620f8c93f6e87ab726e145  ati1rvxx.sys
ATI Technologies

dac7d785cf62f5bd41441e9d6f5a6efe  ati1snxx.sys
ATI Technologies

f7706dae7d101f1b19ce552d772ebfce  ati1ttxx.sys
ATI Technologies

6f714b4720dd80ffa9f8d2731594ea4c  ati1tuxx.sys
ATI Technologies

67ffbc158dd4d27ba3fc92c6acd87f73  ati1xbxx.sys
ATI Technologies

0d8cab1f08f7d3c4de228b49e12e596a  ati1xsxx.sys
ATI Technologies

2d030c2f6b036ca0bc243e1b16d924d1  ati2mtaa.sys
ATI Technologies

8759322ffc1a50569c1e5528ee8026b7  ati2mtag.sys
ATI Technologies

993e7bd6438fe989e328c6b4bca246a9  atinbtxx.sys
ATI Technologies

ed4c2bf8403f4437987c0ba09cf48716  atinmdxx.sys
ATI Technologies

e90ac2b14e98f1a4372e5891b4278784  atinpdxx.sys
ATI Technologies

da36687d701c833430605a298731410b  atinraxx.sys
ATI Technologies

a7a01b907db63898d40b0a14248ff9a2  atinrvxx.sys
ATI Technologies

ceddee2e0591894d19654d458fd3b9be  atinsnxx.sys
ATI Technologies

d80a8f6c0a717446496c3a06d33b0d9c  atinttxx.sys
ATI Technologies

edd66332608d27f4fd5069bcd0bc5164  atintuxx.sys
ATI Technologies

3e7d485cbd0b0d9f6ea2ad9442411831  atinxbxx.sys
ATI Technologies

77b575d7aab35d5908ae6ce681608d62  atinxsxx.sys
ATI Technologies

9916c1225104ba14794209cfa8012159  atmarpc.sys
Microsoft Corporation

39a0a59180f19946374275745b21aeba  atmepvc.sys
Microsoft Corporation

ae76348a2605fb197fa8ff1d6f547836  atmlane.sys
Microsoft Corporation

e7ef69b38d17ba01f914ae8f66216a38  atmuni.sys
Microsoft Corporation

d9f724aa26c010a217c97606b160ed68  audstub.sys
Microsoft Corporation

5d7be7b19e827125e016325334e58ff1  BANTExt.sys

0d93976f7801b7fcd8135cc77257bbd0  battc.sys
Microsoft Corporation

cd4646067cc7dcba1907fa0acf7e3966  bcm4sbxp.sys
Broadcom Corporation

8c31c9db77ed6143ad09dc5fd2c9d9cc  BCMWLNPF.SYS
H`zVS_VERSION_INFO?aStringFileInfobCommentsDCompanyNameCACETechnologiesFileDescriptionnpfbFileVersion,,,vInternalNameNPF+TME[LegalCopyrightCopyrightCACETechnologies.Copyright-NetGroup,PolitecnicodiTorino.(LegalTrademarksbOriginalFilenamenpf.sysPrivateBuildl&ProductNameWinPcapNetgroupPacketFilterDriver<bProductVersion,,,SpecialBuildDVarFileInfo$Translation*

da1f27d85e0d1525f6621372e7b685e9  beep.sys
Microsoft Corporation

f934d1b230f84e1d19dd00ac5a7a83ed  bridge.sys
Microsoft Corporation

b279426e3c0c344893ed78a613a73bde  bthenum.sys
Microsoft Corporation

fca6f069597b62d42495191ace3fc6c1  bthmodem.sys
Microsoft Corporation

80602b8746d3738f5886ce3d67ef06b6  bthpan.sys
Microsoft Corporation

662bfd909447dd9cc15b1a1c366583b4  bthport.sys
Microsoft Corporation

bb68cebffd181e18a26112d1b9f90f3d  bthprint.sys
Microsoft Corporation

61364cd71ef63b0f038b7e9df00f1efa  bthusb.sys
Microsoft Corporation

90a673fc8e12a79afbed2576f6a7aaf9  cbidf2k.sys
Microsoft Corporation

c1b486a7658353d33a10cc15211a873b  cdaudio.sys
Microsoft Corporation

c885b02847f5d2fd45a24e219ed93b32  cdfs.sys
Microsoft Corporation

1f4260cc5b42272d71f79e570a27a4fe  cdrom.sys
Microsoft Corporation

b562592b7f5759c99e179ca467ecfb4c  cinemst2.sys
Ravisent Technologies

fe47dd8fe6d7768ff94ebec6c74b2719  classpnp.sys
Microsoft Corporation

0f6c187d38d98f8df904589a5f94d411  cmbatt.sys
Microsoft Corporation

6e4c9f21f0fae8940661144f41b13203  compbatt.sys
Microsoft Corporation

9624293e55ad405415862b504ca95b73  cpqdap01.sys
Compaq Computer Corp

f50d9bdbb25cce075e514dc07472a22f  crusoe.sys
Microsoft Corporation

e65e2353a5d74ea89971cb918eeeb2f6  diskdump.sys
Microsoft Corporation

044452051f3e02e7963599fc8f4f3e25  disk.sys
Microsoft Corporation

d992fe1274bde0f84ad826acae022a41  dmboot.sys
Microsoft Corp

7c824cf7bbde77d95c08005717a95f6f  dmio.sys
Microsoft Corp

e9317282a63ca4d188c0df5e09c6ac5f  dmload.sys
Microsoft Corp

8a208dfcf89792a484e76c40e5f50b45  dmusic.sys
Microsoft Corporation

8f5fcff8e8848afac920905fbd9d33c8  drmkaud.sys
Microsoft Corporation

6cb08593487f5701d2d2254e693eafce  drmk.sys
Microsoft Corporation

f8918c6b6e5f756db20a8b8c42b5a0ac  dumpdrv.sys
Microsoft Corporation

fe97d0343acfdebdd578fc67cc91fa87  dxapi.sys
Microsoft Corporation

ac7280566a7bb85cb3291f04ddc1198e  dxg.sys
Microsoft Corporation

a73f5d6705b1d820c19b18782e176efd  dxgthk.sys
Microsoft Corporation

d82414ec520453efe2eba936f6a9115a  EAPPkt.sys
Windows DDK provider

80d1b490b60e74e002dc116ec5d41748  enum1394.sys
Microsoft Corporation

38d332a6d56af32635675f132548343e  fastfat.sys
Microsoft Corporation

92cdd60b6730b9f50f6a1a0c1f8cdc81  fdc.sys
Microsoft Corporation

d45926117eb9fa946a6af572fbe1caa3  fips.sys
Microsoft Corporation

9d27e7b80bfcdf1cdd9b555862d5e7f0  flpydisk.sys
Microsoft Corporation

b2cf4b0786f8212cb92ed2b50c6db6b0  fltmgr.sys
Microsoft Corporation

3e1e2bd4f39b0e2b7dc4f4d2bcc2779a  fs_rec.sys
Microsoft Corporation

e0087225b137e57239ff40f8ae82059b  fssfltr_tdi.sys
Microsoft Corporation

455f778ee14368468560bd7cb8c854d0  fsvga.sys
Microsoft Corporation

6ac26732762483366c3969c9e4d2259d  ftdisk.sys
Microsoft Corporation

3a74c423cf6bcca6982715878f450a3b  gagp30kx.sys
Microsoft Corporation

8182ff89c65e4d38b2de4bb0fb18564e  GEARAspiWDM.sys
GEAR Software

3fcc124b6e08ee0e9351f717dd136939  hdaudbus.sys
Windows Server DDK provider

2a013e7530beab6e569faa83f517e836  hdaudio.sys
Windows Server DDK provider

7bd2de4c85eb4241eed57672b16a7d8d  hidbth.sys
Microsoft Corporation

1af592532532a402ed7c060f6954004f  hidclass.sys
Microsoft Corporation

bb1a6fb7d35a91e599973fa74a619056  hidir.sys
Microsoft Corporation

96eccf28fdbf1b2cc12725818a63628d  hidparse.sys
Microsoft Corporation

ccf82c5ec8a7326c3066de870c06daf1  hidusb.sys
Microsoft Corporation

970178e8e003eb1481293830069624b9  hsfbs2s2.sys
Conexant

1225ebea76aac3c84df6c54fe5e5d8be  hsfcxts2.sys
Conexant

ebb354438a4c5a3327fb97306260714a  hsfdpsp2.sys
Conexant

ba6b6fb242a6ba4068c8b763063beb63  HSX_CNXT.sys
Conexant

e8ec1767ea315a39a0dd8989952ca0e9  HSX_DPV.sys
Conexant

61478fa42ee04562e7f11f4dca87e9c8  HSXHWAZL.sys
Conexant

f80a415ef82cd06ffaf0d971528ead38  http.sys
Microsoft Corporation

4a0b06aa8943c1e332520f7440c0aa30  i8042prt.sys
Microsoft Corporation

e8c7cc369c2fb657e0792af70df529e6  igxpmp32.sys
Intel Corporation

083a052659f5310dd8b6a6cb05edcf8e  imapi.sys
Microsoft Corporation

8c953733d8f36eb2133f5bb58808b66b  intelppm.sys
Microsoft Corporation

3bb22519a194418d5fec05d800a19ad0  ip6fw.sys
Microsoft Corporation

731f22ba402ee4b62748adaf6363c182  ipfltdrv.sys
Microsoft Corporation

b87ab476dcf76e72010632b5550955f5  ipinip.sys
Microsoft Corporation

cc748ea12c6effde940ee98098bf96bb  ipnat.sys
Microsoft Corporation

23c74d75e36e7158768dd63d92789a91  ipsec.sys
Microsoft Corporation

b43b36b382aea10861f7c7a37f9d4ae2  irbus.sys
Microsoft Corporation

c93c9ff7b04d772627a3646d89f7bf89  irenum.sys
Microsoft Corporation

05a299ec56e52649b1cf2fc52d20f2d7  isapnp.sys
Microsoft Corporation

463c1ec80cd17420a542b7f36a36f128  kbdclass.sys
Microsoft Corporation

692bcf44383d056aed41b045a323d378  kmixer.sys
Microsoft Corporation

b467646c54cc746128904e1654c750c1  ksecdd.sys
Microsoft Corporation

0753515f78df7f271a5e61c20bcd36a1  ks.sys
Microsoft Corporation

4470e3c1e0c3378e4cab137893c12c3a  mbam.sys
Malwarebytes Corporation

d1f8be91ed4ddb671d42e473e3fe71ab  mcd.sys
Microsoft Corporation

e246a32c445056996074a397da56e815  mdmxsdk.sys
Conexant

a7da20ab18a1bdae28b0f349e57da0d1  mf.sys
Microsoft Corporation

4ae068242760a1fb6e1a44bf4e16afa6  mnmdd.sys
Microsoft Corporation

dfcbad3cec1c5f964962ae10e0bcc8e1  modem.sys
Microsoft Corporation

35c9e97194c8cfb8430125f8dbc34d04  mouclass.sys
Microsoft Corporation

b1c303e17fb9d46e87a98e4ba6769685  mouhid.sys
Microsoft Corporation

a80b9a0bad1b73637dbcbba7df72d3fd  mountmgr.sys
Microsoft Corporation

70c14f5cca5cf73f8a645c73a01d8726  mqac.sys
Microsoft Corporation

11d42bb6206f33fbb3ba0288d3ef81bd  mrxdav.sys
Microsoft Corporation

7d304a5eb4344ebeeab53a2fe3ffb9f0  mrxsmb.sys
Microsoft Corporation

c941ea2454ba8350021d774daf0f1027  msfs.sys
Microsoft Corporation

0a02c63c8b144bd8c86b103dee7c86a2  msgpc.sys
Microsoft Corporation

d1575e71568f4d9e14ca56b7b0453bf1  mskssrv.sys
Microsoft Corporation

325bb26842fc7ccc1fcce2c457317f3e  mspclock.sys
Microsoft Corporation

bad59648ba099da4a17680b39730cb3d  mspqm.sys
Microsoft Corporation

af5f4f3f14a8ea2c26de30f7a1e17136  mssmbios.sys
Microsoft Corporation

c53775780148884ac87c455489a0c070  mtlmnt5.sys
Smart Link

54886a652bf5685192141df304e923fd  mtlstrm.sys
Smart Link

6dda78a0be692b61b668fab860f276cf  mtxparhm.sys
Matrox Graphics

de6a75f5c270e756c5508d94b6cf68f5  mup.sys
Microsoft Corporation

b538dcd9816ea35fa4f637cfc261aaa8  mutohpen.sys
Microsoft Corporation

1277ad8f053cc60c17cafab411f3cf40  N360/1403010.016/ccsetx86.sys
Symantec Corporation

8c9b9036e301a9965cf15bec91c58a12  N360/1403010.016/ironx86.sys
Symantec Corporation

0a8f71e1db5432a5b9285111421e77ec  N360/1403010.016/srtsp.sys
Symantec Corporation

fe9bd381778a344f0e39ae2d5e607d7f  N360/1403010.016/srtspx.sys
Symantec Corporation

6ea77ff0ce4e839ea8b1cea5f5b28c00  N360/1403010.016/symds.sys
Symantec Corporation

1773fb2920ebb3a8bad0360618091470  N360/1403010.016/symefa.sys
Symantec Corporation

40d7124fb57eb208e3dd56a73545fb64  N360/1403010.016/symelam.sys
Symantec Corporation

21698476a90acaa056b8cfe09a82785f  N360/1403010.016/symnets.sys
Symantec Corporation

ec979002eba25c9d109b2fe0e03457da  N360/1403010.016/symtdi.sys
Symantec Corporation

93de018ec6fbaa9a58ff9f2eb9198092  N360/1403010.016/symtdiv.sys
Symantec Corporation

1df7f42665c94b825322fae71721130d  ndis.sys
Microsoft Corporation

0109c4f3850dfbab279542515386ae22  ndistapi.sys
Microsoft Corporation

f927a4434c5028758a842943ef1a3849  ndisuio.sys
Microsoft Corporation

edc1531a49c80614b2cfda43ca8659ab  ndiswan.sys
Microsoft Corporation

9282bd12dfb069d3889eb3fcc1000a9b  ndproxy.sys
Microsoft Corporation

5d81cf9a2f1a3a756b66cf684911cdf0  netbios.sys
Microsoft Corporation

74b2b2f5bea5e9a3dc021d685551bd3d  netbt.sys
Microsoft Corporation

88100ebdd10309fbd445ef8e42452eae  NETw4x32.sys
Intel Corporation

e9e47cfb2d461fa0fc75b7a74c6383ea  nic1394.sys
Microsoft Corporation

be984d604d91c217355cdd3737aad25d  nikedrv.sys
Diamond Multimedia Systems

1e421a6bcf2203cc61b821ada9de878b  nmnt.sys
Microsoft Corporation

3182d64ae053d6fb034f44b6def8034a  npfs.sys
Microsoft Corporation

78a08dd6a8d65e697c18e1db01c5cdca  ntfs.sys
Microsoft Corporation

576b34ceae5b7e5d9fd2775e93b3db53  ntmtlfax.sys
Smart Link

73c1e1f395918bc2c6dd67af7591a3ad  null.sys
Microsoft Corporation

2b298519edbfcf451d43e0f1e8f1006d  nv4_mini.sys
NVIDIA Corporation

b305f3fad35083837ef46a0bbce2fc57  nwlnkflt.sys
Microsoft Corporation

c99b3415198d1aab7227f2c88fd664b9  nwlnkfwd.sys
Microsoft Corporation

8b8b1be2dba4025da6786c645f77f123  nwlnkipx.sys
Microsoft Corporation

56d34a67c05e94e16377c60609741ff8  nwlnknb.sys
Microsoft Corporation

c0bb7d1615e1acbdc99757f6ceaf8cf0  nwlnkspx.sys
Microsoft Corporation

36b9b950e3d2e100970a48d8bad86740  nwrdr.sys
Microsoft Corporation

ca33832df41afb202ee7aeb05145922f  ohci1394.sys
Microsoft Corporation

4bb30ddc53ebc76895e38694580cdfe9  oprghdlr.sys
Microsoft Corporation

c90018bafdc7098619a4a95b046b30f3  p3.sys
Microsoft Corporation

5575faf8f97ce5e713d108c2a58d7c7c  parport.sys
Microsoft Corporation

beb3ba25197665d82ec7065b724171c6  partmgr.sys
Microsoft Corporation

70e98b3fd8e963a6a46a2e6247e0bea1  parvdm.sys
Microsoft Corporation

18b6869e23937175144e6f1d3cb85fc2  PCASp50a64.sys
tH`VS_VERSION_INFO?bTStringFileInfoB|.CompanyNamePrintingCommunicationsAssoc.,Inc.(PCAUSA),FileDescriptionPCAUSANDIS.SPRProtocolDriver(AMD)VFileVersion...builtby:WinDDK>InternalNamePCASpa.SYSDLegalCopyrightCopyright-PrintingCommunicationsAssoc.,Inc.(PCAUSA)FOriginalFilenamePCASpa.SYSXProductNamePCAUSARawetherforWindowsnProductVersion...DVarFileInfo$Translationt*

cc91e0e369df4a052ebdd1ea86af999b  PCASp50.sys
tH`eVS_VERSION_INFO?bStringFileInfoB|.CompanyNamePrintingCommunicationsAssoc.,Inc.(PCAUSA)p$FileDescriptionPCAUSANDIS.SPRProtocolDriverXFileVersion...builtby:WinDDKbInternalNamePCASp.SYSDLegalCopyrightCopyright-PrintingCommunicationsAssoc.,Inc.(PCAUSA)@bOriginalFilenamePCASp.SYSXProductNamePCAUSARawetherforWindows:vProductVersion...DVarFileInfo$Translationt*

ccf5f451bb1a5a2a522a76e670000ff0  pciide.sys
Microsoft Corporation

52e60f29221d0d1ac16737e8dbf7c3e9  pciidex.sys
Microsoft Corporation

a219903ccf74233761d92bef471a07b1  pci.sys
Microsoft Corporation

9e89ef60e9ee05e3f2eef2da7397f1c1  pcmcia.sys
Microsoft Corporation

5b6c11de7e839c05248ced8825470fef  pcouffin.sys
VSO Software

e82a496c3961efc6828b508c310ce98f  portcls.sys
Microsoft Corporation

a32bebaf723557681bfc6bd93e98bd26  processr.sys
Microsoft Corporation

09298ec810b07e5d582cb3a3f9255424  psched.sys
Microsoft Corporation

80d317bd1c3dbc5d4fe7b1678c60cadd  ptilink.sys
 Parallel Technologies

fe0d99d6f31e4fad8159f690d68ded9c  rasacd.sys
Microsoft Corporation

11b4a627bc9614b885c4969bfa5ff8a6  rasl2tp.sys
Microsoft Corporation

5bc962f2654137c9909c3d4603587dee  raspppoe.sys
Microsoft Corporation

efeec01b1d3cf84f16ddd24d9d9d8f99  raspptp.sys
Microsoft Corporation

fdbb1d60066fcfbb7452fd8f9829b242  raspti.sys
Microsoft Corporation

01524cd237223b18adbb48f70083f101  rawwan.sys
Microsoft Corporation

7ad224ad1a1437fe28d89cf22b17780a  rdbss.sys
Microsoft Corporation

4912d5b403614ce99c28420f75353332  rdpcdd.sys
Microsoft Corporation

15cabd0f7c00c47c70124907916af3f1  rdpdr.sys
Microsoft Corporation

43af5212bd8fb5ba6eed9754358bd8f7  rdpwd.sys
Microsoft Corporation

e9aaa0092d74a9d371659c4c38882e12  recagent.sys
Smart Link

f828dd7e1419b6653894a8f97a0094c5  redbook.sys
Microsoft Corporation

851c30df2807fcfa21e4c681a7d6440e  rfcomm.sys
Microsoft Corporation

d85e3fa9f5b1f29bb4ed185c450d1470  rimmptsk.sys
Ricoh Company

db8eb01c58c9fada00c70b1775278ae0  rimsptsk.sys
Ricoh Company

a56fe08ec7473e8580a390bb1081cdd7  rio8drv.sys
Diamond Multimedia Systems

0a854df84c77a0be205bfeab2ae4f0ec  riodrv.sys
Diamond Multimedia Systems

6c1f93c0760c9f79a1869d07233df39d  rixdptsk.sys
Ricoh Company

96f7a9a7bf0c9c0440a967440065d33c  rmcast.sys
Microsoft Corporation

601844cbcf617ff8c868130ca5b2039d  rndismp.sys
Microsoft Corporation

726548542afeca56257ff01eb13bb6d7  rndismpx.sys
Microsoft Corporation

d8b0b4ade32574b2d9c5cc34dc0dbbe7  rootmdm.sys
Microsoft Corporation

0e11b35e972796042044bc27ce13b065  rspndr.sys
Microsoft Corporation

fdeb7475c1460ee7aaab2fe83c991b64  rtl8187B.sys
Realtek Semiconductor

c26a053e4db47f6cdd8653c83aaf22ee  s24trans.sys
Intel Corporation

0dbcc071a268e0340a2ba6bdd98bace4  s3gnbm.sys
SGraphics

76c465f570e90c28942d52ccb2580a10  scsiport.sys
Microsoft Corporation

8d04819a3ce51b9eb47e5689b44d43c4  sdbus.sys
Microsoft Corporation

90a3935d05b494a5a39d37e71f09a677  secdrv.sys
Macrovision Corporation

0f29512ccd6bead730039fb4bd2c85ce  serenum.sys
Microsoft Corporation

cca207a8896d4c6a0c9ce29a4ae411a7  serial.sys
Microsoft Corporation

0fa803c64df0914b41f807ea276bf2a6  sffdisk.sys
Microsoft Corporation

d66d22d76878bf3483a6be30183fb648  sffp_mmc.sys
Microsoft Corporation

c17c331e435ed8737525c86a7557b3ac  sffp_sd.sys
Microsoft Corporation

8e6b8c671615d126fdc553d1e2de5562  sfloppy.sys
Microsoft Corporation

6b33d0ebd30db32e27d1d78fe946a754  sisagp.sys
Silicon Integrated Systems

d9673011648a71ed1e1f77b831bc85e6  slnt7554.sys
Smart Link

2c1779c0feb1f4a6033600305eba623a  slntamr.sys
Smart Link

f9b8e30e82ee95cf3e1d3e495599b99c  slnthal.sys
Smart Link

db56bb2c55723815cf549d7fc50cfceb  slwdmsup.sys
Smart Link

14bb60a4f1c5291217a05d5728c403e6  SmartDefragDriver.sys

895be38a993b9bd5abbe570d63d88a2e  smbali.sys
Microsoft Corporation

017daecf0ed3aa731313433601ec40fa  smclib.sys
Microsoft Corporation

489703624dac94ed943c2abda022a1cd  sonydcam.sys
Microsoft Corporation

ab8b92451ecb048a4d1de7c3ffcb4a9f  splitter.sys
Microsoft Corporation

76bb022c2fb6902fd5bdd4f78fc13a5d  sr.sys
Microsoft Corporation

47ddfc2f003f7f9f0592c6874962a2e7  srv.sys
Microsoft Corporation

e57b778208c783d8debab320c16a1b82  StarOpen.sys

951801dfb54d86f611f0af47825476f9  sthda.sys
SigmaTel

3e5d89099ded9e86e5639f411693218f  stream.sys
Microsoft Corporation

3941d127aef12e93addf6fe6ee027e0f  swenum.sys
Microsoft Corporation

8ce882bcc6cf8a62f2b2323d95cb3d01  swmidi.sys
Microsoft Corporation

c940f10c31e2c60cc967ffd6a370720c  SYMEVENT.SYS
Symantec Corporation

fa2daa32bed908023272a0f77d625dae  SynTP.sys
Synaptics

8b83f3ed0f1688b4958f77cd6d2bf290  sysaudio.sys
Microsoft Corporation

fd6093e3decd925f1cffc8a0dd539d72  tape.sys
Microsoft Corporation

4e53bbcc4be37d7a4bd6ef1098c89ff7  tcpip6.sys
Microsoft Corporation

9aefa14bd6b182d61e3119fa5f436d3d  tcpip.sys
Microsoft Corporation

0539d5e53587f82d1b4fd74c5be205cf  tdi.sys
Microsoft Corporation

6471a66807f5e104e4885f5b67349397  tdpipe.sys
Microsoft Corporation

c56b6d0402371cf3700eb322ef3aaf61  tdtcp.sys
Microsoft Corporation

88155247177638048422893737429d9e  termdd.sys
Microsoft Corporation

699450901c5ccfd82357cbc531cedd23  tosdvd.sys
Microsoft Corporation

d74a8ec75305f1d3cfde7c7fc1bd62a9  tsbvcap.sys
Toshiba Corporation

8f861eda21c05857eb8197300a92501c  tunmp.sys
Microsoft Corporation

d85938f272d1bcf3db3a31fc0a048928  uagp35.sys
Microsoft Corporation

5787b80c2e3c5e2f56c2a233d91fa2c9  udfs.sys
Microsoft Corporation

402ddc88356b1bac0ee3dd1580c76a31  update.sys
Microsoft Corporation

24bb6ca00ed8c91dae2fd13e5f6eec39  usb101et.sys
KLSI USA

2a7a8ad9d39a2faf9d9293b5daff3a4b  usb8023.sys
Microsoft Corporation

b4d7b7ad8a9f7c063c5cc3e2c1a0724e  usb8023x.sys
Microsoft Corporation

d4fb6ecc60a428564ba8768b0e23c0fc  usbaapl.sys
Apple

ce97845d2e3f0d274b8bac1ed07c6149  usbcamd2.sys
Microsoft Corporation

1c1a47b40c23358245aa8d0443b6935e  usbcamd.sys
Microsoft Corporation

173f317ce0db8e21322e71b7e60a27e8  usbccgp.sys
Microsoft Corporation

596eb39b50d6ebd9b734dc4ae0544693  usbd.sys
Microsoft Corporation

65dcf09d0e37d4c6b11b5b0b76d470a7  usbehci.sys
Microsoft Corporation

1ab3cdde553b6e064d2e754efe20285c  usbhub.sys
Microsoft Corporation

290913dc4f1125e5a82de52579a44c43  usbintel.sys
Microsoft Corporation

791912e524cc2cc6f50b5f2b52d1eb71  usbport.sys
Microsoft Corporation

a0b8cf9deb1184fbdd20784a58fa75d4  usbscan.sys
Microsoft Corporation

a32426d9b14a089eaa1d922e0c5801a9  usbstor.sys
Microsoft Corporation

26496f9dee2d787fc3e61ad54821ffe6  usbuhci.sys
Microsoft Corporation

63bbfca7f390f4c49ed4b96bfb1633e0  usbvideo.sys
Microsoft Corporation

55e01061c74a8cefff58dc36114a8d3f  vdmindvd.sys
Ravisent Technologies

0d3a8fafceacd8b7625cd549757a7df1  vga.sys
Microsoft Corporation

754292ce5848b3738281b4f3607eaef4  viaagp.sys
Microsoft Corporation

e28726b72c46821a28830e077d39a55b  videoprt.sys
Microsoft Corporation

4c8fcb5cc53aab716d810740fe59d025  volsnap.sys
Microsoft Corporation

aced8c149b30f8496c237bcba3727b48  wacompen.sys
Microsoft Corporation

0308aef61941e4af478fa1a0f83812f5  wadv07nt.sys
Intel Corporation

714038a8aa5de08e12062202cd7eaeb5  wadv08nt.sys
Intel Corporation

7bb3aa595e4507a788de1cdc63f4c8c4  wadv09nt.sys
Intel Corporation

36e6c405b6143d09687f4056fd9a0d10  wadv11nt.sys
Intel Corporation

e20b95baedb550f32dd489265c1da1f6  wanarp.sys
Microsoft Corporation

352fa0e98bc461ce1ce5d41f64db558d  watv06nt.sys
Intel Corporation

791cc45de6e50445be72e8ad6401ff45  watv10nt.sys
Intel Corporation

6768acf64b18196494413695f0c3a00f  wdmaud.sys
Microsoft Corporation

c42584fd66ce9e17403aebca199f7bdb  wmiacpi.sys
Microsoft Corporation

2f31b7f954bed437f2c75026c65caf7b  wmilib.sys
Microsoft Corporation

cf4def1bf66f06964dc0d91844239104  wpdusb.sys
Microsoft Corporation

56fb00bec891a38b54c68e52bce2b0a4  WPN111.sys
Atheros Communications

6abe6e225adb5a751622a9cc3bc19ce8  ws2ifsl.sys
Microsoft Corporation

f15feafffbb3644ccc80c5da584e6311  WudfPf.sys
Microsoft Corporation

28b524262bce6de1f7ef9f510ba3985b  WudfRd.sys
Microsoft Corporation

05a74d2be6f493c65d7221d1d0e8a23c  xbreader.sys
Thesycon GmbH
 



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:11 AM

Posted 07 June 2013 - 08:40 PM

Download http://noahdfear.net/downloads/rst.sh to the USB drive
  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Confirm that you see rst.sh that you downloaded there
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh
  • Press Enter
  • After it has finished a report will be located at sdb1 named enum.log
  • Plug that USB back into the clean computer and open it
Please note: If you have an ethernet connection you can access the internet by way of xPUD (Firefox). You can perform all these steps on your sick computer. When you download the download will reside in the Download folder. It can be found under the File tab also. You can similarly access our thread by way of this OS too so you can send the logs that way.

Please also note - all text entries are case sensitive

Copy and paste the enum.log for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 noeltelling

noeltelling
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 08 June 2013 - 01:42 PM

Here's enum.log:

 

46.5M Jun  7 03:11 /mnt/sda1/WINDOWS/system32/config/software
5.5M Jun  7 03:11 /mnt/sda1/WINDOWS/system32/config/system

46.5M May  2 10:00 /sda1/~/RP1470/~SOFTWARE
46.5M May  3 10:00 /sda1/~/RP1471/~SOFTWARE
46.5M May  4 10:00 /sda1/~/RP1472/~SOFTWARE
46.5M May  5 22:40 /sda1/~/RP1473/~SOFTWARE
46.5M May  6 10:00 /sda1/~/RP1474/~SOFTWARE
46.5M May  7 10:00 /sda1/~/RP1475/~SOFTWARE
46.5M May  8 10:00 /sda1/~/RP1476/~SOFTWARE
46.5M May  9 10:00 /sda1/~/RP1477/~SOFTWARE
46.5M May 10 10:00 /sda1/~/RP1478/~SOFTWARE
46.5M May 11 10:00 /sda1/~/RP1479/~SOFTWARE
46.5M May 12 10:00 /sda1/~/RP1480/~SOFTWARE
46.5M May 14 01:43 /sda1/~/RP1481/~SOFTWARE
46.5M May 14 10:00 /sda1/~/RP1482/~SOFTWARE
46.5M May 15 10:00 /sda1/~/RP1483/~SOFTWARE
46.5M May 16 10:00 /sda1/~/RP1484/~SOFTWARE
46.5M May 17 10:00 /sda1/~/RP1485/~SOFTWARE
46.5M May 18 10:02 /sda1/~/RP1486/~SOFTWARE
46.5M May 19 00:04 /sda1/~/RP1487/~SOFTWARE
46.5M May 19 10:00 /sda1/~/RP1488/~SOFTWARE
46.5M May 19 10:02 /sda1/~/RP1489/~SOFTWARE
46.5M May 19 13:32 /sda1/~/RP1490/~SOFTWARE
46.5M May 20 10:00 /sda1/~/RP1491/~SOFTWARE
46.5M May 21 10:00 /sda1/~/RP1492/~SOFTWARE
46.5M May 22 10:00 /sda1/~/RP1493/~SOFTWARE
46.5M May 23 10:02 /sda1/~/RP1494/~SOFTWARE
46.5M May 24 10:01 /sda1/~/RP1495/~SOFTWARE
46.5M May 25 04:03 /sda1/~/RP1496/~SOFTWARE
46.5M May 25 10:00 /sda1/~/RP1497/~SOFTWARE
46.5M May 27 21:53 /sda1/~/RP1498/~SOFTWARE
46.5M May 28 08:13 /sda1/~/RP1499/~SOFTWARE
46.5M May 29 09:19 /sda1/~/RP1500/~SOFTWARE
46.5M May 29 10:00 /sda1/~/RP1501/~SOFTWARE
46.4M May 30 10:01 /sda1/~/RP1502/~SOFTWARE
46.4M May 31 10:01 /sda1/~/RP1503/~SOFTWARE
46.4M Jun  1 10:00 /sda1/~/RP1504/~SOFTWARE
46.4M Jun  2 10:01 /sda1/~/RP1505/~SOFTWARE
46.4M Jun  4 03:05 /sda1/~/RP1506/~SOFTWARE
46.4M Jun  4 10:01 /sda1/~/RP1507/~SOFTWARE
46.4M Jun  5 03:47 /sda1/~/RP1508/~SOFTWARE
5.3M May  2 10:00 /sda1/~/RP1470/~SYSTEM
5.3M May  3 10:00 /sda1/~/RP1471/~SYSTEM
5.3M May  4 10:00 /sda1/~/RP1472/~SYSTEM
5.3M May  5 22:40 /sda1/~/RP1473/~SYSTEM
5.3M May  6 10:00 /sda1/~/RP1474/~SYSTEM
5.3M May  7 10:00 /sda1/~/RP1475/~SYSTEM
5.3M May  8 10:00 /sda1/~/RP1476/~SYSTEM
5.3M May  9 10:00 /sda1/~/RP1477/~SYSTEM
5.3M May 10 10:00 /sda1/~/RP1478/~SYSTEM
5.3M May 11 10:00 /sda1/~/RP1479/~SYSTEM
5.3M May 12 10:00 /sda1/~/RP1480/~SYSTEM
5.3M May 14 01:43 /sda1/~/RP1481/~SYSTEM
5.3M May 14 10:00 /sda1/~/RP1482/~SYSTEM
5.3M May 15 10:00 /sda1/~/RP1483/~SYSTEM
5.3M May 16 10:00 /sda1/~/RP1484/~SYSTEM
5.3M May 17 10:00 /sda1/~/RP1485/~SYSTEM
5.3M May 18 10:03 /sda1/~/RP1486/~SYSTEM
5.4M May 19 00:04 /sda1/~/RP1487/~SYSTEM
5.4M May 19 10:00 /sda1/~/RP1488/~SYSTEM
5.4M May 19 10:02 /sda1/~/RP1489/~SYSTEM
5.4M May 19 13:32 /sda1/~/RP1490/~SYSTEM
5.4M May 20 10:00 /sda1/~/RP1491/~SYSTEM
5.4M May 21 10:00 /sda1/~/RP1492/~SYSTEM
5.4M May 22 10:00 /sda1/~/RP1493/~SYSTEM
5.4M May 23 10:02 /sda1/~/RP1494/~SYSTEM
5.4M May 24 10:01 /sda1/~/RP1495/~SYSTEM
5.4M May 25 04:03 /sda1/~/RP1496/~SYSTEM
5.4M May 25 10:00 /sda1/~/RP1497/~SYSTEM
5.4M May 27 21:53 /sda1/~/RP1498/~SYSTEM
5.4M May 28 08:13 /sda1/~/RP1499/~SYSTEM
5.4M May 29 09:19 /sda1/~/RP1500/~SYSTEM
5.4M May 29 10:00 /sda1/~/RP1501/~SYSTEM
5.4M May 30 10:01 /sda1/~/RP1502/~SYSTEM
5.4M May 31 10:01 /sda1/~/RP1503/~SYSTEM
5.4M Jun  1 10:01 /sda1/~/RP1504/~SYSTEM
5.4M Jun  2 10:02 /sda1/~/RP1505/~SYSTEM
5.4M Jun  4 03:05 /sda1/~/RP1506/~SYSTEM
5.4M Jun  4 10:01 /sda1/~/RP1507/~SYSTEM
5.4M Jun  5 03:47 /sda1/~/RP1508/~SYSTEM
 



#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:05:11 AM

Posted 08 June 2013 - 03:41 PM

Let's see if there is an available registry backup we can use to help get your computer booting properly
  • Boot the Sick computer with the USB drive again
  • Press File
  • Expand mnt
  • Expand your USB (sdb1)
  • Press Tool at the top
  • Choose Open Terminal
  • Type bash rst.sh -r
  • Type 1502
  • Press Enter
  • After it has finished a report will be located at sdb1 named restore.log
  • Please try to boot into normal Windows now and indicate if you were successful
Please note - all text entries are case sensitive

Copy and paste the restore.log from your USB drive for my review
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 noeltelling

noeltelling
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:01:11 AM

Posted 09 June 2013 - 10:01 PM

I am able to boot Windows again but the infection is still there.

 

When I ran Firefox, a popup said I MUST update Firefox. I didn't because I already am at versiion 21.

 

Anyway, here is the restore.log:

 

SOFTWARE hive restored from RP1502
SYSTEM hive restored from RP1502
SECURITY hive restored from RP1502
SAM hive restored from RP1502
 






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users