Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

White Screen Windows 7


  • This topic is locked This topic is locked
45 replies to this topic

#1 DaphRox

DaphRox

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 14 June 2013 - 04:50 PM

So, on my frinds's laptop, running Windows 7, it has a white screen after Windows finished logging in. When I shut the computer down, it would flash the complete desktop before actually logging off, but not long enough to do anything. I attempted to start the computer in Safe Mode, and in Safe Mode with Networking, but both of those attempts only led to the computer rebooting itself into Normal Mode. I have no idea what to do now. I know that Gringo has addressed this issue with others before, but all of those threads have specific warnings to not use those scripts on other computers as they were designed for use on that persons computer only. I would really appreciate help.

 

 



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 PM

Posted 15 June 2013 - 04:09 PM


Hello DaphRox

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:

    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt
  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • First Press the Scan button.
  • It will make a log (FRST.txt)
I want you to poste the FRST.txt report into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 17 June 2013 - 09:28 PM

Thank you Gringo, I will be working and will be able to DL tomorrow evening (Tuesday),  I will update with the information you requested then. 

 

Thank you :thumbup2:



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 PM

Posted 17 June 2013 - 09:44 PM

no problem and I will look for you then



gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 18 June 2013 - 08:25 PM

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 19-06-2013
Ran by SYSTEM on 18-06-2013 21:20:01
Running from I:\
Windows 7 Home Premium (X64) OS Language: English(US)
Internet Explorer Version 10
Boot Mode: Recovery

The current controlset is ControlSet001
ATTENTION!:=====> FRST is updated to run from normal or Safe mode to produce a full FRST.txt log and an extra Addition.txt log.

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [SynTPEnh] %ProgramFiles%\Synaptics\SynTP\SynTPEnh.exe [2480936 2010-12-20] (Synaptics Incorporated)
HKLM\...\Run: [RTHDVCPL] C:\Program Files\Realtek\Audio\HDA\RtkNGUI64.exe -s [7466600 2012-05-10] (Realtek Semiconductor)
HKLM\...\Run: [HPWirelessAssistant] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\DelayedAppStarter.exe 120 C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWA_Main.exe /hidden [363064 2010-07-21] (Hewlett-Packard Company)
HKLM-x32\...\Run: [StartCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun [336384 2011-03-04] (Advanced Micro Devices, Inc.)
HKLM-x32\...\Run: [HP Quick Launch] C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe [578944 2012-03-05] (Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [HPOSD] C:\Program Files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe [379960 2011-08-19] (Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59720 2013-04-21] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe" [152392 2013-05-15] (Apple Inc.)
HKU\fisher\...\Run: [Windows Time] rundll32.exe "C:\ProgramData\EfsercOxhecv.dll",EntryPoint [13824 2013-05-28] ()
HKU\fisher\...\CurrentVersion\Windows: [Load] C:\Users\fisher\LOCALS~1\Temp\msiwcvvau.pif
HKU\fisher\...\Winlogon: [Shell] explorer.exe,C:\Users\fisher\AppData\Roaming\skype.dat [139264 2011-11-16] () <==== ATTENTION
Startup: C:\ProgramData\Start Menu\Programs\Startup\McAfee Security Scan Plus.lnk
ShortcutTarget: McAfee Security Scan Plus.lnk -> C:\Program Files (x86)\McAfee Security Scan\3.0.318\SSScheduler.exe (McAfee, Inc.)

==================== Services (Whitelisted) =================

S2 AMD FUEL Service; C:\Program Files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [354304 2011-03-04] (Advanced Micro Devices, Inc.)
S2 AMD Reservation Manager; C:\Program Files\ATI Technologies\ATI.ACE\Reservation Manager\AMD Reservation Manager.exe [194496 2010-06-17] (Advanced Micro Devices)
S3 McComponentHostService; C:\Program Files (x86)\McAfee Security Scan\3.0.318\McCHSvc.exe [235216 2013-02-05] (McAfee, Inc.)

==================== Drivers (Whitelisted) ====================


==================== NetSvcs (Whitelisted) ===================


==================== One Month Created Files and Folders ========

2013-06-18 20:51 - 2013-06-18 20:51 - 00000000 ____D C:\FRST
2013-05-28 13:20 - 2013-06-08 09:01 - 00000000 ____D C:\ProgramData\52C951476A6988C2000052C8FE848EE5
2013-05-28 13:19 - 2013-05-28 13:19 - 00013824 ____A C:\ProgramData\EfsercOxhecv.dll
2013-05-25 02:50 - 2013-06-08 09:27 - 00000004 ____A C:\Users\fisher\AppData\Roaming\skype.ini
2013-05-22 15:16 - 2013-05-22 16:07 - 00002044 ____A C:\Users\Public\Desktop\McAfee Security Scan Plus.lnk
2013-05-22 15:16 - 2013-05-22 16:07 - 00000000 ____D C:\Program Files (x86)\McAfee Security Scan
2013-05-22 15:16 - 2013-05-22 15:16 - 00000000 ____D C:\ProgramData\McAfee Security Scan
2013-05-22 15:16 - 2013-05-22 15:16 - 00000000 ____D C:\ProgramData\McAfee
2013-05-22 15:11 - 2013-05-22 15:11 - 00000000 ____D C:\Users\Public\CyberLink
2013-05-22 15:11 - 2013-05-22 15:11 - 00000000 ____D C:\ProgramData\CyberLink

==================== One Month Modified Files and Folders =======

2013-06-18 20:51 - 2013-06-18 20:51 - 00000000 ____D C:\FRST
2013-06-18 05:17 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT
2013-06-18 05:17 - 2009-07-13 20:51 - 00109529 ____A C:\Windows\setupact.log
2013-06-08 15:45 - 2012-09-07 13:37 - 00000898 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-06-08 15:45 - 2012-05-09 06:53 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-06-08 12:58 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-06-08 09:45 - 2012-05-01 17:37 - 01761697 ____A C:\Windows\WindowsUpdate.log
2013-06-08 09:39 - 2009-07-13 20:45 - 00032064 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-06-08 09:39 - 2009-07-13 20:45 - 00032064 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-06-08 09:27 - 2013-05-25 02:50 - 00000004 ____A C:\Users\fisher\AppData\Roaming\skype.ini
2013-06-08 09:19 - 2012-09-07 13:37 - 00000894 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-06-08 09:05 - 2012-05-10 06:41 - 00000336 ____A C:\Windows\Tasks\HPCeeScheduleForfisher.job
2013-06-08 09:02 - 2012-05-01 15:37 - 00000000 ____D C:\users\fisher
2013-06-08 09:01 - 2013-05-28 13:20 - 00000000 ____D C:\ProgramData\52C951476A6988C2000052C8FE848EE5
2013-05-28 13:19 - 2013-05-28 13:19 - 00013824 ____A C:\ProgramData\EfsercOxhecv.dll
2013-05-26 02:42 - 2013-01-10 15:21 - 00000000 ____D C:\Users\fisher\Documents\Youcam
2013-05-26 02:27 - 2009-07-13 21:08 - 00032582 ____A C:\Windows\Tasks\SCHEDLGU.TXT
2013-05-25 07:01 - 2012-09-07 13:37 - 00002183 ____A C:\Users\Public\Desktop\Google Chrome.lnk
2013-05-22 16:07 - 2013-05-22 15:16 - 00002044 ____A C:\Users\Public\Desktop\McAfee Security Scan Plus.lnk
2013-05-22 16:07 - 2013-05-22 15:16 - 00000000 ____D C:\Program Files (x86)\McAfee Security Scan
2013-05-22 16:07 - 2012-09-07 13:36 - 00000000 ____D C:\ProgramData\Adobe
2013-05-22 15:16 - 2013-05-22 15:16 - 00000000 ____D C:\ProgramData\McAfee Security Scan
2013-05-22 15:16 - 2013-05-22 15:16 - 00000000 ____D C:\ProgramData\McAfee
2013-05-22 15:15 - 2012-05-09 06:52 - 00692104 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-05-22 15:15 - 2012-05-09 06:52 - 00071048 ____A (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2013-05-22 15:11 - 2013-05-22 15:11 - 00000000 ____D C:\Users\Public\CyberLink
2013-05-22 15:11 - 2013-05-22 15:11 - 00000000 ____D C:\ProgramData\CyberLink
2013-05-22 14:00 - 2012-05-02 05:00 - 00000052 ____A C:\Windows\SysWOW64\DOErrors.log
2013-05-22 13:59 - 2012-05-15 06:00 - 00000000 ____A C:\Windows\System32\HP_ActiveX_Patch_NOT_DETECTED.txt

Files to move or delete:
====================
C:\Users\fisher\AppData\Roaming\skype.dat
C:\Users\fisher\AppData\Roaming\skype.ini

==================== Known DLLs (Whitelisted) ================


==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================

Restore point made on: 2013-04-11 04:53:09
Restore point made on: 2013-04-14 15:00:38
Restore point made on: 2013-04-16 13:51:15
Restore point made on: 2013-04-22 02:16:06
Restore point made on: 2013-04-23 02:07:25
Restore point made on: 2013-04-24 02:21:31
Restore point made on: 2013-04-28 15:00:27
Restore point made on: 2013-04-30 02:14:22
Restore point made on: 2013-05-03 13:44:20
Restore point made on: 2013-05-06 05:10:45
Restore point made on: 2013-05-07 16:57:50
Restore point made on: 2013-05-12 17:25:54
Restore point made on: 2013-05-15 12:51:37
Restore point made on: 2013-05-16 12:42:21
Restore point made on: 2013-05-19 16:17:04
Restore point made on: 2013-05-21 13:14:37
Restore point made on: 2013-05-28 13:20:07
Restore point made on: 2013-05-29 13:15:02
Restore point made on: 2013-06-07 19:32:43

==================== Memory info ===========================

Percentage of memory in use: 23%
Total physical RAM: 2666.91 MB
Available physical RAM: 2040.81 MB
Total Pagefile: 2665.05 MB
Available Pagefile: 2020.34 MB
Total Virtual: 8192 MB
Available Virtual: 8191.86 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:284.06 GB) (Free:248.38 GB) NTFS (Disk=0 Partition=2) ==>[System with boot components (obtained from reading drive)]
Drive e: (RECOVERY) (Fixed) (Total:13.73 GB) (Free:1.71 GB) NTFS (Disk=0 Partition=3) ==>[System with boot components (obtained from reading drive)]
Drive f: (HP_TOOLS) (Fixed) (Total:0.1 GB) (Free:0.09 GB) FAT32 (Disk=0 Partition=4)
Drive g: (TrendMicro) (CDROM) (Total:0.25 GB) (Free:0 GB) CDFS
Drive h: (U3 System) (CDROM) (Total:0.01 GB) (Free:0 GB) CDFS
Drive i: () (Removable) (Total:7.47 GB) (Free:3.83 GB) FAT32 (Disk=1 Partition=1)
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
Drive y: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.16 GB) NTFS (Disk=0 Partition=1) ==>[System with boot components (obtained from reading drive)]

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 298 GB) (Disk ID: 20ED0ABE)
Partition 1: (Active) - (Size=199 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=284 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=14 GB) - (Type=07 NTFS)
Partition 4: (Not Active) - (Size=103 MB) - (Type=0C)

========================================================
Disk: 1 (Size: 7 GB) (Disk ID: 00000000)
Partition 1: (Not Active) - (Size=7 GB) - (Type=0B)


LastRegBack: 2013-04-14 15:35

==================== End Of Log ============================



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 PM

Posted 18 June 2013 - 09:15 PM



Hello DaphRox



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
HKU\fisher\...\Run: [Windows Time] rundll32.exe "C:\ProgramData\EfsercOxhecv.dll",EntryPoint [13824 2013-05-28] ()
HKU\fisher\...\CurrentVersion\Windows: [Load] C:\Users\fisher\LOCALS~1\Temp\msiwcvvau.pif
HKU\fisher\...\Winlogon: [Shell] explorer.exe,C:\Users\fisher\AppData\Roaming\skype.dat [139264 2011-11-16] () <==== ATTENTION
C:\Users\fisher\AppData\Roaming\skype.dat
C:\Users\fisher\AppData\Roaming\skype.ini
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 19 June 2013 - 05:17 AM

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 19-06-2013
Ran by SYSTEM at 2013-06-19 06:14:53 Run:1
Running from I:\
Boot Mode: Recovery
==============================================

HKU\fisher\Software\Microsoft\Windows\CurrentVersion\Run\\Windows Time => Value deleted successfully.
HKU\fisher\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell => Value deleted successfully.
C:\Users\fisher\AppData\Roaming\skype.dat => Moved successfully.
C:\Users\fisher\AppData\Roaming\skype.ini => Moved successfully.

==== End of Fixlog ====



#8 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 19 June 2013 - 05:24 AM

I started up in normal mode and was able access the desktop and connect to the internet.  So far so good,  :thumbup2:



#9 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 20 June 2013 - 03:37 PM

Is there anything else I should do now?



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 PM

Posted 21 June 2013 - 10:26 PM



Hello

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 22 June 2013 - 07:22 AM

# AdwCleaner v2.303 - Logfile created 06/22/2013 at 08:15:32
# Updated 08/06/2013 by Xplode
# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)
# User : fisher - FISHER-HP
# Boot Mode : Normal
# Running from : C:\Users\fisher\Downloads\AdwCleaner.exe
# Option [Delete]
 
 
***** [Services] *****
 
 
***** [Files / Folders] *****
 
 
***** [Registry] *****
 
 
***** [Internet Browsers] *****
 
-\\ Internet Explorer v10.0.9200.16611
 
[OK] Registry is clean.
 
-\\ Google Chrome v27.0.1453.116
 
File : C:\Users\fisher\AppData\Local\Google\Chrome\User Data\Default\Preferences
 
[OK] File is clean.
 
*************************
 
AdwCleaner[S1].txt - [664 octets] - [22/06/2013 08:15:32]
 
########## EOF - C:\AdwCleaner[S1].txt - [723 octets] ##########


#12 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 22 June 2013 - 07:39 AM

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 4.9.4 (05.06.2013:1)
OS: Windows 7 Home Premium x64
Ran by fisher on Sat 06/22/2013 at  8:24:53.18
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sat 06/22/2013 at  8:37:36.19
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 PM

Posted 22 June 2013 - 08:40 AM


Hello DaphRox

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 DaphRox

DaphRox
  • Topic Starter

  • Members
  • 85 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:New York
  • Local time:03:43 PM

Posted 24 June 2013 - 05:28 PM

ComboFix 13-06-24.01 - fisher 06/24/2013  18:10:39.2.2 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.2667.1437 [GMT -4:00]
Running from: c:\users\fisher\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\programdata\EfsercOxhecv.dll
c:\users\fisher\AppData\Roaming\msxml4.dll
c:\users\fisher\AppData\Roaming\msxml4a.dll
c:\users\fisher\AppData\Roaming\msxml4r.dll
.
.
(((((((((((((((((((((((((   Files Created from 2013-05-24 to 2013-06-24  )))))))))))))))))))))))))))))))
.
.
2013-06-24 22:20 . 2013-06-24 22:20 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-06-24 20:19 . 2013-06-12 03:08 9552976 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{22678B2A-A982-42D3-B547-F58BA01708FE}\mpengine.dll
2013-06-22 12:24 . 2013-06-22 12:24 -------- d-----w- c:\windows\ERUNT
2013-06-22 12:24 . 2013-06-22 12:24 -------- d-----w- C:\JRT
2013-06-20 07:06 . 2013-06-20 07:06 -------- d-----w- c:\windows\system32\MpEngineStore
2013-06-20 07:01 . 2013-06-08 12:28 2706432 ----a-w- c:\windows\system32\mshtml.tlb
2013-06-19 10:27 . 2013-05-08 06:39 1910632 ----a-w- c:\windows\system32\drivers\tcpip.sys
2013-06-19 10:27 . 2013-04-26 05:51 751104 ----a-w- c:\windows\system32\win32spl.dll
2013-06-19 10:27 . 2013-04-26 04:55 492544 ----a-w- c:\windows\SysWow64\win32spl.dll
2013-06-19 10:27 . 2013-05-10 05:49 30720 ----a-w- c:\windows\system32\cryptdlg.dll
2013-06-19 10:27 . 2013-05-10 03:20 24576 ----a-w- c:\windows\SysWow64\cryptdlg.dll
2013-06-19 10:27 . 2013-04-17 06:24 1424384 ----a-w- c:\windows\system32\WindowsCodecs.dll
2013-06-19 10:27 . 2013-04-17 07:02 1230336 ----a-w- c:\windows\SysWow64\WindowsCodecs.dll
2013-06-19 10:26 . 2013-05-13 03:43 1192448 ----a-w- c:\windows\system32\certutil.exe
2013-06-19 10:26 . 2013-05-13 03:08 903168 ----a-w- c:\windows\SysWow64\certutil.exe
2013-06-19 10:26 . 2013-05-13 05:51 1464320 ----a-w- c:\windows\system32\crypt32.dll
2013-06-19 10:26 . 2013-05-13 04:45 1160192 ----a-w- c:\windows\SysWow64\crypt32.dll
2013-06-19 10:26 . 2013-05-13 05:51 184320 ----a-w- c:\windows\system32\cryptsvc.dll
2013-06-19 10:26 . 2013-05-13 05:51 139776 ----a-w- c:\windows\system32\cryptnet.dll
2013-06-19 10:26 . 2013-05-13 05:50 52224 ----a-w- c:\windows\system32\certenc.dll
2013-06-19 10:26 . 2013-05-13 04:45 140288 ----a-w- c:\windows\SysWow64\cryptsvc.dll
2013-06-19 10:26 . 2013-05-13 04:45 103936 ----a-w- c:\windows\SysWow64\cryptnet.dll
2013-06-19 10:26 . 2013-05-13 03:08 43008 ----a-w- c:\windows\SysWow64\certenc.dll
2013-06-19 10:26 . 2013-04-25 23:30 1505280 ----a-w- c:\windows\SysWow64\d3d11.dll
2013-06-19 10:26 . 2013-03-31 22:52 1887232 ----a-w- c:\windows\system32\d3d11.dll
2013-06-19 04:51 . 2013-06-19 04:51 -------- d-----w- C:\FRST
2013-05-28 21:20 . 2013-06-08 17:01 -------- d-----w- c:\programdata\52C951476A6988C2000052C8FE848EE5
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-06-20 07:04 . 2012-05-09 19:49 75825640 ----a-w- c:\windows\system32\MRT.exe
2013-06-19 10:50 . 2012-05-09 14:52 71048 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2013-06-19 10:50 . 2012-05-09 14:52 692104 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe
2013-05-02 06:06 . 2010-11-21 03:27 278800 ------w- c:\windows\system32\MpSigStub.exe
2013-04-13 05:49 . 2013-05-15 20:58 135168 ----a-w- c:\windows\apppatch\AppPatch64\AcXtrnal.dll
2013-04-13 05:49 . 2013-05-15 20:58 350208 ----a-w- c:\windows\apppatch\AppPatch64\AcLayers.dll
2013-04-13 05:49 . 2013-05-15 20:58 308736 ----a-w- c:\windows\apppatch\AppPatch64\AcGenral.dll
2013-04-13 05:49 . 2013-05-15 20:58 111104 ----a-w- c:\windows\apppatch\AppPatch64\acspecfc.dll
2013-04-13 04:45 . 2013-05-15 20:58 474624 ----a-w- c:\windows\apppatch\AcSpecfc.dll
2013-04-13 04:45 . 2013-05-15 20:58 2176512 ----a-w- c:\windows\apppatch\AcGenral.dll
2013-04-12 14:45 . 2013-04-24 10:14 1656680 ----a-w- c:\windows\system32\drivers\ntfs.sys
2013-04-10 06:01 . 2013-05-15 20:58 265064 ----a-w- c:\windows\system32\drivers\dxgmms1.sys
2013-04-10 06:01 . 2013-05-15 20:58 983400 ----a-w- c:\windows\system32\drivers\dxgkrnl.sys
2013-04-10 03:30 . 2013-05-15 20:57 3153920 ----a-w- c:\windows\system32\win32k.sys
2013-04-01 06:03 . 2013-05-15 20:57 78680 ----a-w- c:\windows\system32\mcupdate_AuthenticAMD.dll
2013-03-29 11:54 . 2013-03-29 11:54 97280 ----a-w- c:\windows\system32\mshtmled.dll
2013-03-29 11:54 . 2013-03-29 11:54 905728 ----a-w- c:\windows\system32\mshtmlmedia.dll
2013-03-29 11:54 . 2013-03-29 11:54 81408 ----a-w- c:\windows\system32\icardie.dll
2013-03-29 11:54 . 2013-03-29 11:54 762368 ----a-w- c:\windows\system32\ieapfltr.dll
2013-03-29 11:54 . 2013-03-29 11:54 73728 ----a-w- c:\windows\SysWow64\SetIEInstalledDate.exe
2013-03-29 11:54 . 2013-03-29 11:54 719360 ----a-w- c:\windows\SysWow64\mshtmlmedia.dll
2013-03-29 11:54 . 2013-03-29 11:54 61952 ----a-w- c:\windows\SysWow64\tdc.ocx
2013-03-29 11:54 . 2013-03-29 11:54 599552 ----a-w- c:\windows\system32\vbscript.dll
2013-03-29 11:54 . 2013-03-29 11:54 523264 ----a-w- c:\windows\SysWow64\vbscript.dll
2013-03-29 11:54 . 2013-03-29 11:54 48640 ----a-w- c:\windows\SysWow64\mshtmler.dll
2013-03-29 11:54 . 2013-03-29 11:54 452096 ----a-w- c:\windows\system32\dxtmsft.dll
2013-03-29 11:54 . 2013-03-29 11:54 441856 ----a-w- c:\windows\system32\html.iec
2013-03-29 11:54 . 2013-03-29 11:54 38400 ----a-w- c:\windows\SysWow64\imgutil.dll
2013-03-29 11:54 . 2013-03-29 11:54 361984 ----a-w- c:\windows\SysWow64\html.iec
2013-03-29 11:54 . 2013-03-29 11:54 281600 ----a-w- c:\windows\system32\dxtrans.dll
2013-03-29 11:54 . 2013-03-29 11:54 27648 ----a-w- c:\windows\system32\licmgr10.dll
2013-03-29 11:54 . 2013-03-29 11:54 270848 ----a-w- c:\windows\system32\iedkcs32.dll
2013-03-29 11:54 . 2013-03-29 11:54 247296 ----a-w- c:\windows\system32\webcheck.dll
2013-03-29 11:54 . 2013-03-29 11:54 235008 ----a-w- c:\windows\system32\url.dll
2013-03-29 11:54 . 2013-03-29 11:54 23040 ----a-w- c:\windows\SysWow64\licmgr10.dll
2013-03-29 11:54 . 2013-03-29 11:54 226304 ----a-w- c:\windows\system32\elshyph.dll
2013-03-29 11:54 . 2013-03-29 11:54 216064 ----a-w- c:\windows\system32\msls31.dll
2013-03-29 11:54 . 2013-03-29 11:54 197120 ----a-w- c:\windows\system32\msrating.dll
2013-03-29 11:54 . 2013-03-29 11:54 185344 ----a-w- c:\windows\SysWow64\elshyph.dll
2013-03-29 11:54 . 2013-03-29 11:54 167424 ----a-w- c:\windows\system32\iexpress.exe
2013-03-29 11:54 . 2013-03-29 11:54 158720 ----a-w- c:\windows\SysWow64\msls31.dll
2013-03-29 11:54 . 2013-03-29 11:54 1509376 ----a-w- c:\windows\system32\inetcpl.cpl
2013-03-29 11:54 . 2013-03-29 11:54 150528 ----a-w- c:\windows\SysWow64\iexpress.exe
2013-03-29 11:54 . 2013-03-29 11:54 144896 ----a-w- c:\windows\system32\wextract.exe
2013-03-29 11:54 . 2013-03-29 11:54 1441280 ----a-w- c:\windows\SysWow64\inetcpl.cpl
2013-03-29 11:54 . 2013-03-29 11:54 1400416 ----a-w- c:\windows\system32\ieapfltr.dat
2013-03-29 11:54 . 2013-03-29 11:54 138752 ----a-w- c:\windows\SysWow64\wextract.exe
2013-03-29 11:54 . 2013-03-29 11:54 137216 ----a-w- c:\windows\SysWow64\ieUnatt.exe
2013-03-29 11:54 . 2013-03-29 11:54 12800 ----a-w- c:\windows\SysWow64\mshta.exe
2013-03-29 11:54 . 2013-03-29 11:54 110592 ----a-w- c:\windows\SysWow64\IEAdvpack.dll
2013-03-29 11:54 . 2013-03-29 11:54 1054720 ----a-w- c:\windows\system32\MsSpellCheckingFacility.exe
2013-03-29 11:54 . 2013-03-29 11:54 102912 ----a-w- c:\windows\system32\inseng.dll
2013-03-29 11:54 . 2013-03-29 11:54 92160 ----a-w- c:\windows\system32\SetIEInstalledDate.exe
2013-03-29 11:54 . 2013-03-29 11:54 77312 ----a-w- c:\windows\system32\tdc.ocx
2013-03-29 11:54 . 2013-03-29 11:54 62976 ----a-w- c:\windows\system32\pngfilt.dll
2013-03-29 11:54 . 2013-03-29 11:54 52224 ----a-w- c:\windows\system32\msfeedsbs.dll
2013-03-29 11:54 . 2013-03-29 11:54 51200 ----a-w- c:\windows\system32\imgutil.dll
2013-03-29 11:54 . 2013-03-29 11:54 48640 ----a-w- c:\windows\system32\mshtmler.dll
2013-03-29 11:54 . 2013-03-29 11:54 173568 ----a-w- c:\windows\system32\ieUnatt.exe
2013-03-29 11:54 . 2013-03-29 11:54 149504 ----a-w- c:\windows\system32\occache.dll
2013-03-29 11:54 . 2013-03-29 11:54 13824 ----a-w- c:\windows\system32\mshta.exe
2013-03-29 11:54 . 2013-03-29 11:54 136192 ----a-w- c:\windows\system32\iepeers.dll
2013-03-29 11:54 . 2013-03-29 11:54 135680 ----a-w- c:\windows\system32\IEAdvpack.dll
2013-03-29 11:54 . 2013-03-29 11:54 12800 ----a-w- c:\windows\system32\msfeedssync.exe
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2011-03-04 336384]
"HP Quick Launch"="c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe" [2012-03-05 578944]
"HPOSD"="c:\program files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe" [2011-08-19 379960]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2013-04-22 59720]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2013-05-15 152392]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
R1 iggmoybm;iggmoybm;c:\windows\system32\drivers\iggmoybm.sys;c:\windows\SYSNATIVE\drivers\iggmoybm.sys [x]
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x]
R3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL6.SYS;c:\windows\SYSNATIVE\DRIVERS\VSTAZL6.SYS [x]
R3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV6.SYS;c:\windows\SYSNATIVE\DRIVERS\VSTDPV6.SYS [x]
R3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT6.SYS;c:\windows\SYSNATIVE\DRIVERS\VSTCNXT6.SYS [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys;c:\windows\SYSNATIVE\Drivers\usbaapl64.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe;c:\windows\SYSNATIVE\Wat\WatAdminSvc.exe [x]
S0 amd_sata;amd_sata;c:\windows\system32\DRIVERS\amd_sata.sys;c:\windows\SYSNATIVE\DRIVERS\amd_sata.sys [x]
S0 amd_xata;amd_xata;c:\windows\system32\DRIVERS\amd_xata.sys;c:\windows\SYSNATIVE\DRIVERS\amd_xata.sys [x]
S2 AERTFilters;Andrea RT Filters Service;c:\program files\Realtek\Audio\HDA\AERTSr64.exe;c:\program files\Realtek\Audio\HDA\AERTSr64.exe [x]
S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe;c:\windows\SYSNATIVE\atiesrxx.exe [x]
S2 AMD FUEL Service;AMD FUEL Service;c:\program files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe;c:\program files\ATI Technologies\ATI.ACE\Fuel\Fuel.Service.exe [x]
S2 AMD Reservation Manager;AMD Reservation Manager;c:\program files\ATI Technologies\ATI.ACE\Reservation Manager\AMD Reservation Manager.exe;c:\program files\ATI Technologies\ATI.ACE\Reservation Manager\AMD Reservation Manager.exe [x]
S2 HP Support Assistant Service;HP Support Assistant Service;c:\program files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe;c:\program files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe [x]
S2 HP Wireless Assistant Service;HP Wireless Assistant Service;c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWA_Service.exe;c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWA_Service.exe [x]
S2 HPWMISVC;HPWMISVC;c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe;c:\program files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe [x]
S2 IconMan_R;IconMan_R;c:\program files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe;c:\program files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe [x]
S3 amdiox64;AMD IO Driver;c:\windows\system32\DRIVERS\amdiox64.sys;c:\windows\SYSNATIVE\DRIVERS\amdiox64.sys [x]
S3 clwvd;CyberLink WebCam Virtual Driver;c:\windows\system32\DRIVERS\clwvd.sys;c:\windows\SYSNATIVE\DRIVERS\clwvd.sys [x]
S3 RSPCIESTOR;Realtek PCIE CardReader Driver;c:\windows\system32\DRIVERS\RtsPStor.sys;c:\windows\SYSNATIVE\DRIVERS\RtsPStor.sys [x]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys;c:\windows\SYSNATIVE\DRIVERS\Rt64win7.sys [x]
S3 RTL8192Ce;Realtek Wireless LAN 802.11n PCI-E NIC Driver;c:\windows\system32\DRIVERS\rtl8192Ce.sys;c:\windows\SYSNATIVE\DRIVERS\rtl8192Ce.sys [x]
S3 usbfilter;AMD USB Filter Driver;c:\windows\system32\DRIVERS\usbfilter.sys;c:\windows\SYSNATIVE\DRIVERS\usbfilter.sys [x]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-06-20 20:33 1165776 ----a-w- c:\program files (x86)\Google\Chrome\Application\27.0.1453.116\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2013-06-24 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-05-09 10:50]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-09-07 21:37]
.
2013-06-24 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-09-07 21:37]
.
2013-06-08 c:\windows\Tasks\HPCeeScheduleForfisher.job
- c:\program files (x86)\Hewlett-Packard\HP Ceement\HPCEE.exe [2010-09-14 02:15]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2012-05-10 7466600]
"HPWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\DelayedAppStarter.exe" [2010-07-21 8192]
"MRT"="c:\windows\system32\MRT.exe" [2013-06-20 75825640]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.optimum.net/
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
TCP: DhcpNameServer = 192.168.1.1
.
- - - - ORPHANS REMOVED - - - -
.
HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start
HKLM-Run-SynTPEnh - c:\program files (x86)\Synaptics\SynTP\SynTPEnh.exe
AddRemove-{EE202411-2C26-49E8-9784-1BC1DBF7DE96} - c:\program files (x86)\InstallShield Installation Information\{EE202411-2C26-49E8-9784-1BC1DBF7DE96}\setup.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_7_700_224_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.11"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_224.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-06-24  18:25:10
ComboFix-quarantined-files.txt  2013-06-24 22:25
.
Pre-Run: 264,852,561,920 bytes free
Post-Run: 265,075,003,392 bytes free
.
- - End Of File - - 0466F7C54AD8A522D870BE0FD3AA71E1
A36C5E4F47E84449FF07ED3517B43A31


#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:03:43 PM

Posted 24 June 2013 - 09:37 PM


Hello DaphRox

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache::


 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users