Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Random Popups - Reminder your computer is not backed up


  • Please log in to reply
3 replies to this topic

#1 Kiwee

Kiwee

  • Members
  • 97 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New Zealand
  • Local time:09:48 AM

Posted 11 August 2013 - 05:13 AM

I'm trying to help my neighbours who have random popups appearing.  There description of the actual popups is a little vague but one I did notice was "Reminder your computer is not backed up"  It did not look like a Nortons popup to me and apparently there are lots of others that show.

 

I have run ADWCleaner and Security Check by Screen317 to try and solve the problem but I'm sure its still happening.

 

Results are posted below.  Can anyone pleas help / direct me to what I should do next.

 

Thanks

 

ADWCleaner

 

 

# AdwCleaner v2.306 - Logfile created 08/09/2013 at 13:56:53
# Updated 19/07/2013 by Xplode
# Operating system : Windows Vista ™ Home Premium Service Pack 1 (32 bits)
# User : El Rose Stud - HOME
# Boot Mode : Normal
# Running from : C:\Users\El Rose Stud\Downloads\adwcleaner.exe
# Option [Delete]
 
 
***** [Services] *****
 
Stopped & Deleted : MyWebSearchService
 
***** [Files / Folders] *****
 
File Deleted : C:\Program Files\Mozilla FireFox\Components\AskHPRFF.js
File Deleted : C:\Program Files\Mozilla FireFox\Components\AskSearch.js
File Deleted : C:\Users\El Rose Stud\Desktop\Optimizer Pro.lnk
File Deleted : C:\Users\Public\Desktop\Streaming Music - MediaPass.lnk
File Deleted : C:\Windows\system32\roboot.exe
File Deleted : C:\Windows\Tasks\RegClean Pro_DEFAULT.job
File Deleted : C:\Windows\Tasks\RegClean Pro_UPDATES.job
Folder Deleted : C:\Program Files\Advanced System Protector
Folder Deleted : C:\Program Files\AskBarDis
Folder Deleted : C:\Program Files\Inbox Toolbar
Folder Deleted : C:\Program Files\optimizer pro
Folder Deleted : C:\Program Files\RegClean Pro
Folder Deleted : C:\Program Files\Vaudix
Folder Deleted : C:\Program Files\WebSearch
Folder Deleted : C:\ProgramData\BetterSoft
Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Advanced System Protector
Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Inbox Toolbar
Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\optimizer pro
Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\RegClean Pro
Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\SearchNewTab
Folder Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\VVauydiX
Folder Deleted : C:\ProgramData\SearchNewTab
Folder Deleted : C:\ProgramData\SoftSafe
Folder Deleted : C:\ProgramData\VVauydiX
Folder Deleted : C:\Users\El Rose Stud\AppData\Local\Google\Chrome\User Data\Default\Extensions\jlhccpcccfekaghogaabakgphipgahob
Folder Deleted : C:\Users\El Rose Stud\AppData\Local\Google\Chrome\User Data\Default\Extensions\lnmffbhcfbfpgkobgabgmhoojdoeadph
Folder Deleted : C:\Users\El Rose Stud\AppData\LocalLow\FunWebProducts
Folder Deleted : C:\Users\El Rose Stud\AppData\LocalLow\Inbox Toolbar
Folder Deleted : C:\Users\El Rose Stud\AppData\LocalLow\MyWebSearch
Folder Deleted : C:\Users\El Rose Stud\AppData\Roaming\optimizer pro
Folder Deleted : C:\Users\Elle\AppData\LocalLow\FunWebProducts
Folder Deleted : C:\Users\Elle\AppData\LocalLow\MyWebSearch
 
***** [Registry] *****
 
Data Deleted : HKLM\..\Windows [AppInit_DLLs] = c:\progra~1\vaudix\sprote~1.dll
Data Deleted : HKLM\..\Windows [AppInit_DLLs] = c:\progra~1\websea~1\sprote~1.dll
Key Deleted : HKCU\Software\AppDataLow\HavingFunOnline
Key Deleted : HKCU\Software\AppDataLow\Software\Fun Web Products
Key Deleted : HKCU\Software\AppDataLow\Software\FunWebProducts
Key Deleted : HKCU\Software\AppDataLow\Software\MarketPrecision
Key Deleted : HKCU\Software\AppDataLow\Software\MyWebSearch
Key Deleted : HKCU\Software\AppDataLow\SProtector
Key Deleted : HKCU\Software\AskBarDis
Key Deleted : HKCU\Software\IEBarProperties
Key Deleted : HKCU\Software\Inbox Toolbar
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\MenuExt\&Search
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{CF739809-1C6C-47C0-85B9-569DBB141420}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Ask Toolbar_is1
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\mywebsearch bar uninstall
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{6212EB22-64D5-840B-8503-355F47B2CB19}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{83FF80F4-8C74-4B80-B5BA-C8DDD434E5C4}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{B05FFA0B-A460-6D8C-6D5F-630E1A28BB42}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{042DA63B-0933-403D-9395-B49307691690}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6212EB22-64D5-840B-8503-355F47B2CB19}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{83FF80F4-8C74-4B80-B5BA-C8DDD434E5C4}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B05FFA0B-A460-6D8C-6D5F-630E1A28BB42}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKCU\Software\MyWebSearch
Key Deleted : HKCU\Software\Optimizer Pro
Key Deleted : HKCU\Software\systweak
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{08993A7C-E764-4172-9627-BFB5EA6897B2}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{128A6C66-AC6A-4617-8268-AB7F47B7215E}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{14F35FFC-522A-4DD1-A07E-6B8B65C6891E}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{571715D7-3395-4DF0-B43C-784836209E60}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{612AD33D-9824-4E87-8396-92374E91C4BB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6212EB22-64D5-840B-8503-355F47B2CB19}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9AFB8248-617F-460D-9366-D71CDEDA3179}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B05FFA0B-A460-6D8C-6D5F-630E1A28BB42}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{31E3BC75-2A09-4CFF-9C92-8D0ED8D1DC0F}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4634804A-F0B0-4A74-A550-FC0EEF8A4362}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4C07EA4F-5F52-4222-B170-4CD9ED33BAEA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}
Key Deleted : HKLM\SOFTWARE\Classes\PROTOCOLS\Handler\inbox
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{AC329328-7EC4-4C34-B672-0A2B90CB9B00}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D2E5FA06-DCC7-46F9-BEFF-BFD06F69B9B2}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E2343056-CC08-46AC-B898-BFC7ACF4E755}
Key Deleted : HKLM\Software\FocusInteractive
Key Deleted : HKLM\Software\Fun Web Products
Key Deleted : HKLM\Software\FunWebProducts
Key Deleted : HKLM\Software\Inbox Toolbar
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Multimedia\WMPlayer\Schemes\f3pss
Key Deleted : HKLM\SOFTWARE\Microsoft\Office\Outlook\Addins\MyWebSearch.OutlookAddin
Key Deleted : HKLM\SOFTWARE\Microsoft\Office\Word\Addins\MyWebSearch.OutlookAddin
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{6212EB22-64D5-840B-8503-355F47B2CB19}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{B05FFA0B-A460-6D8C-6D5F-630E1A28BB42}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{612AD33D-9824-4E87-8396-92374E91C4BB}_is1
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{681002C6-5019-81A2-7871-A43754F71E56}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C670DCAE-E392-AA32-6F42-143C7FC4BDFD}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ask Toolbar_is1
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\mywebsearch bar uninstall
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Optimizer Pro_is1
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OptimizerPro
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\RegClean Pro_is1
Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@mywebsearch.com/Plugin
Key Deleted : HKLM\Software\MyWebSearch
Key Deleted : HKLM\Software\SP Global
Key Deleted : HKLM\Software\SProtector
Key Deleted : HKLM\Software\systweak
Key Deleted : HKU\S-1-5-21-1371311046-699996760-777523849-1003\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}
Key Deleted : HKU\S-1-5-21-1371311046-699996760-777523849-1003\Software\Microsoft\Internet Explorer\SearchScopes\{CF739809-1C6C-47C0-85B9-569DBB141420}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{D7E97865-918F-41E4-9CD0-25AB1C574CE8}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\URLSearchHooks [{D3D233D5-9F6D-436C-B6C7-E63F77503B30}]
Value Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Run [Optimizer Pro]
Value Deleted : HKCU\Software\Mozilla\Firefox\Extensions [adparatus@adparatus.com]
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{D7E97865-918F-41E4-9CD0-25AB1C574CE8}]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows Media\Wmsdk\Sources [F3PopularScreenSavers]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\post platform [FunWebProducts]
Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [m3ffxtbr@mywebsearch.com]
 
***** [Internet Browsers] *****
 
-\\ Internet Explorer v8.0.6001.19088
 
Replaced : [HKCU\Software\Microsoft\Internet Explorer\Main - Search Bar] = hxxp://toolbar.inbox.com/search/dispatcher.aspx?tp=aus&qkw=%s&tbid=%tb_id&%language --> hxxp://www.google.com
Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\Main - Start Page] = hxxp://websearch.youwillfind.info/?pid=345&r=2013/05/01&hid=1174593691&lg=EN&cc=NZ --> hxxp://www.google.com
Replaced : [HKLM\SOFTWARE\Microsoft\Internet Explorer\Main - Search Bar] = hxxp://www.tangosearch.com/?useie5=1&q= --> hxxp://www.google.com
 
-\\ Mozilla Firefox v22.0 (en-US)
 
File : C:\Users\El Rose Stud\AppData\Roaming\Mozilla\Firefox\Profiles\21lsf77h.default\prefs.js
 
C:\Users\El Rose Stud\AppData\Roaming\Mozilla\Firefox\Profiles\21lsf77h.default\user.js .... Deleted !
 
Deleted : user_pref("aol_toolbar.default.homepage.check", false);
Deleted : user_pref("aol_toolbar.default.search.check", false);
Deleted : user_pref("extensions.BabylonToolbar.prtkDS", 0);
Deleted : user_pref("extensions.BabylonToolbar.prtkHmpg", 0);
Deleted : user_pref("sweetim.toolbar.previous.browser.search.defaultenginename", "");
Deleted : user_pref("sweetim.toolbar.previous.browser.search.selectedEngine", "");
Deleted : user_pref("sweetim.toolbar.previous.browser.startup.homepage", "");
Deleted : user_pref("sweetim.toolbar.previous.keyword.URL", "");
Deleted : user_pref("sweetim.toolbar.scripts.1.domain-blacklist", "");
Deleted : user_pref("sweetim.toolbar.searchguard.UserRejectedGuard_DS", "");
Deleted : user_pref("sweetim.toolbar.searchguard.UserRejectedGuard_HP", "");
Deleted : user_pref("sweetim.toolbar.searchguard.enable", "");
 
-\\ Google Chrome v28.0.1500.95
 
File : C:\Users\El Rose Stud\AppData\Local\Google\Chrome\User Data\Default\Preferences
 
[OK] File is clean.
 
File : C:\Users\sandra.home\AppData\Local\Google\Chrome\User Data\Default\Preferences
 
[OK] File is clean.
 
*************************
 
AdwCleaner[S1].txt - [13021 octets] - [09/08/2013 13:56:53]
 
########## EOF - C:\AdwCleaner[S1].txt - [13082 octets] ##########
 

 

Security Check

 

 Results of screen317's Security Check version 0.99.72  
 Windows Vista Service Pack 1 x86 (UAC is enabled)  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
 WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
 Java™ 6 Update 30  
 Java version out of Date!
 Adobe Flash Player 11.7.700.224  
 Adobe Reader 9 Adobe Reader out of Date!
 Mozilla Firefox 22.0 Firefox out of Date!
 Google Chrome 28.0.1500.72  
 Google Chrome 28.0.1500.95  
````````Process Check: objlist.exe by Laurent````````
 Windows Defender MSASCui.exe 
 Windows Defender MSASCui.exe   
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 0 % 
````````````````````End of Log``````````````````````

Edited by hamluis, 11 August 2013 - 06:54 AM.
Moved from XP to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:48 PM

Posted 11 August 2013 - 11:21 AM

p22002970.gif Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.

  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


p22002970.gif Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size

Click Go and post the result.

p22002970.gif Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

p22002970.gifDownload Malwarebytes Anti-Rootkit from HERE to your Desktop.
  • Unzip downloaded file.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • DO NOT click on the Cleanup button. Simply exit the program.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt


p22002970.gif Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.


If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

NOTE Do NOT wrap your logs in "quote" or "code" brackets.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 Kiwee

Kiwee
  • Topic Starter

  • Members
  • 97 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:New Zealand
  • Local time:09:48 AM

Posted 17 August 2013 - 07:04 PM

Hi, sorry its taken me a few days to get this done.

 

Here are the results.  The popups are still happening.

 

 

Thanks

Mike

 

 

Farbar Service Scanner Version: 17-08-2013
Ran by El Rose Stud (administrator) on 17-08-2013 at 19:43:55
Running from "D:\Mike\Music"
Microsoft® Windows Vista™ Home Premium  Service Pack 1 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.

Windows Firewall:
=============

Firewall Disabled Policy:
==================

System Restore:
============

System Restore Disabled Policy:
========================

Security Center:
============

Windows Update:
============

Windows Autoupdate Disabled Policy:
============================

Windows Defender:
==============

Other Services:
==============

File Check:
========
C:\Windows\system32\nsisvc.dll => MD5 is legit
C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit
C:\Windows\system32\dhcpcsvc.dll => MD5 is legit
C:\Windows\system32\Drivers\afd.sys
[2011-06-15 22:38] - [2011-04-22 01:16] - 0273408 ____A (Microsoft Corporation) 48EB99503533C27AC6135648E5474457

C:\Windows\system32\Drivers\tdx.sys => MD5 is legit
C:\Windows\system32\Drivers\tcpip.sys
[2010-08-12 17:47] - [2010-06-17 03:59] - 0898952 ____A (Microsoft Corporation) 782568AB6A43160A159B6215B70BCCE9

C:\Windows\system32\dnsrslvr.dll
[2011-04-14 17:37] - [2011-03-03 02:49] - 0086528 ____A (Microsoft Corporation) 4805D9A6D281C7A7DEFD9094DEC6AF7D

C:\Windows\system32\mpssvc.dll
[2008-01-21 14:24] - [2008-01-21 14:24] - 0393216 ____A (Microsoft Corporation) D1639BA315B0D79DEC49A4B0E1FB929B

C:\Windows\system32\bfe.dll
[2008-01-21 14:23] - [2008-01-21 14:23] - 0328704 ____A (Microsoft Corporation) 8582E233C346AEFE759833E8A30DD697

C:\Windows\system32\Drivers\mpsdrv.sys => MD5 is legit
C:\Windows\system32\SDRSVC.dll => MD5 is legit
C:\Windows\system32\vssvc.exe
[2008-01-21 14:23] - [2008-01-21 14:23] - 1054720 ____A (Microsoft Corporation) D5FB73D19C46ADE183F968E13F186B23

C:\Windows\system32\wscsvc.dll
[2008-01-21 14:23] - [2008-01-21 14:23] - 0061440 ____A (Microsoft Corporation) 683DD16B590372F2C9661D277F35E49C

C:\Windows\system32\wbem\WMIsvc.dll
[2008-01-21 14:24] - [2008-01-21 14:24] - 0161792 ____A (Microsoft Corporation) 00B79A7C984678F24CF052E5BEB3A2F5

C:\Windows\system32\wuaueng.dll => MD5 is legit
C:\Windows\system32\qmgr.dll
[2008-01-21 14:25] - [2008-01-21 14:25] - 0758272 ____A (Microsoft Corporation) 02ED7B4DBC2A3232A389106DA7515C3D

C:\Windows\system32\es.dll
[2009-04-08 20:45] - [2008-04-18 17:48] - 0269312 ____A (Microsoft Corporation) 3CB3343D720168B575133A0A20DC2465

C:\Windows\system32\cryptsvc.dll
[2008-01-21 14:24] - [2008-01-21 14:24] - 0128000 ____A (Microsoft Corporation) 6DE363F9F99334514C46AEC02D3E3678

C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
C:\Windows\system32\ipnathlp.dll => MD5 is legit
C:\Windows\system32\iphlpsvc.dll
[2010-04-15 11:36] - [2010-02-19 02:11] - 0190464 ____A (Microsoft Corporation) 6A35D233693EDC29A12742049BC5E37F

C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\rpcss.dll
[2009-08-17 11:56] - [2009-03-03 16:39] - 0551424 ____A (Microsoft Corporation) 301AE00E12408650BADDC04DBC832830

 

**** End of log ****

 

 

 

 

MiniToolBox by Farbar  Version: 13-07-2013
Ran by El Rose Stud (administrator) on 17-08-2013 at 19:54:52
Running from "D:\Mike\Virus Scan"
Microsoft® Windows Vista™ Home Premium  Service Pack 1 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================

::1             localhost

127.0.0.1       localhost

========================= IP Configuration: ================================

NVIDIA nForce 10/100/1000 Mbps Ethernet  = Local Area Connection (Connected)

# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled

popd
# End of IPv4 configuration

 

Windows IP Configuration

   Host Name . . . . . . . . . . . . : home
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : NVIDIA nForce 10/100/1000 Mbps Ethernet
   Physical Address. . . . . . . . . : 00-25-11-1C-2D-B7
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::41ff:7d72:d8b6:3bee%10(Preferred)
   IPv4 Address. . . . . . . . . . . : 10.1.1.6(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.0.0.0
   Lease Obtained. . . . . . . . . . : Saturday, 17 August 2013 3:56:21 p.m.
   Lease Expires . . . . . . . . . . : Saturday, 17 August 2013 8:26:21 p.m.
   Default Gateway . . . . . . . . . : 10.1.1.1
   DHCP Server . . . . . . . . . . . : 10.1.1.1
   DNS Servers . . . . . . . . . . . : 10.1.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter Local Area Connection* 6:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 02-00-54-55-4E-01
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:9d38:6ab8:2889:26f1:f5fe:fef9(Preferred)
   Link-local IPv6 Address . . . . . : fe80::2889:26f1:f5fe:fef9%11(Preferred)
   Default Gateway . . . . . . . . . : ::
   NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 7:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : isatap.{88DEC9B9-E573-4634-B668-ED3BB6074735}
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  mygateway1.ar7
Address:  10.1.1.1

Name:    google.com
Addresses:  74.125.237.131
   74.125.237.128
   74.125.237.133
   74.125.237.129
   74.125.237.142
   74.125.237.130
   74.125.237.137
   74.125.237.136
   74.125.237.135
   74.125.237.132
   74.125.237.134

 

Pinging google.com [74.125.237.131] with 32 bytes of data:

Reply from 74.125.237.131: bytes=32 time=65ms TTL=54

Reply from 74.125.237.131: bytes=32 time=66ms TTL=54

 

Ping statistics for 74.125.237.131:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 65ms, Maximum = 66ms, Average = 65ms

Server:  mygateway1.ar7
Address:  10.1.1.1

Name:    yahoo.com
Addresses:  98.138.253.109
   98.139.183.24
   206.190.36.45

 

Pinging yahoo.com [98.138.253.109] with 32 bytes of data:

Reply from 98.138.253.109: bytes=32 time=265ms TTL=48

Reply from 98.138.253.109: bytes=32 time=291ms TTL=48

 

Ping statistics for 98.138.253.109:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 265ms, Maximum = 291ms, Average = 278ms

 

Pinging 127.0.0.1 with 32 bytes of data:

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

 

Ping statistics for 127.0.0.1:

    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

    Minimum = 0ms, Maximum = 0ms, Average = 0ms

===========================================================================
Interface List
 10 ...00 25 11 1c 2d b7 ...... NVIDIA nForce 10/100/1000 Mbps Ethernet
  1 ........................... Software Loopback Interface 1
 11 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
 13 ...00 00 00 00 00 00 00 e0  isatap.{88DEC9B9-E573-4634-B668-ED3BB6074735}
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0         10.1.1.1         10.1.1.6     20
         10.0.0.0        255.0.0.0         On-link          10.1.1.6    276
         10.1.1.6  255.255.255.255         On-link          10.1.1.6    276
   10.255.255.255  255.255.255.255         On-link          10.1.1.6    276
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link          10.1.1.6    276
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link          10.1.1.6    276
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 11     18 ::/0                     On-link
  1    306 ::1/128                  On-link
 11     18 2001::/32                On-link
 11    266 2001:0:9d38:6ab8:2889:26f1:f5fe:fef9/128
                                    On-link
 10    276 fe80::/64                On-link
 11    266 fe80::/64                On-link
 11    266 fe80::2889:26f1:f5fe:fef9/128
                                    On-link
 10    276 fe80::41ff:7d72:d8b6:3bee/128
                                    On-link
  1    306 ff00::/8                 On-link
 11    266 ff00::/8                 On-link
 10    276 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\system32\NLAapi.dll [48128] (Microsoft Corporation)
Catalog5 02 C:\Windows\system32\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\system32\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\system32\winrnr.dll [19968] (Microsoft Corporation)
Catalog5 07 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 02 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 03 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 04 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 05 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 06 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 07 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 08 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 09 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 11 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 12 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 13 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 14 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 15 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 16 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 17 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 18 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 19 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 20 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 21 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 22 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 23 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 24 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 25 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 26 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 27 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 28 C:\Windows\system32\mswsock.dll [223232] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (08/17/2013 03:27:46 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/14/2013 08:25:34 PM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/14 20:25:34.692]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 5

Error: (08/14/2013 08:25:33 PM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/14 20:25:33.678]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 5

Error: (08/14/2013 08:25:32 PM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/14 20:25:32.477]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/13/2013 11:46:45 AM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/13 11:46:45.480]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/13/2013 11:18:16 AM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/13 11:18:16.594]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/11/2013 10:30:48 PM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/11 22:30:48.254]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/11/2013 09:55:54 PM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/11 21:55:54.109]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/09/2013 01:59:32 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/07/2013 06:59:19 PM) (Source: Brother BrLog) (User: )
Description: STI BrtSTI: [2013/08/07 18:59:19.165]: [00002220]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 5

System errors:
=============
Error: (08/17/2013 03:56:18 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.1.1.6 for the Network Card with network address 0025111C2DB7 has been denied by the DHCP server 10.1.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (08/17/2013 03:26:15 PM) (Source: HTTP) (User: )
Description: \Device\Http\ReqQueueKerberos

Error: (08/17/2013 03:26:15 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.1.1.6 for the Network Card with network address 0025111C2DB7 has been denied by the DHCP server 10.1.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (08/17/2013 03:26:12 PM) (Source: EventLog) (User: )
Description: The previous system shutdown at 3:24:49 p.m. on 17/08/2013 was unexpected.

Error: (08/17/2013 01:59:21 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.1.1.6 for the Network Card with network address 0025111C2DB7 has been denied by the DHCP server 10.1.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (08/16/2013 10:29:18 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.1.1.6 for the Network Card with network address 0025111C2DB7 has been denied by the DHCP server 10.1.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (08/16/2013 08:29:15 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.1.1.6 for the Network Card with network address 0025111C2DB7 has been denied by the DHCP server 10.1.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (08/16/2013 06:59:12 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.1.1.6 for the Network Card with network address 0025111C2DB7 has been denied by the DHCP server 10.1.1.1 (The DHCP Server sent a DHCPNACK message).

Error: (08/09/2013 01:59:05 PM) (Source: HTTP) (User: )
Description: \Device\Http\ReqQueueKerberos

Error: (08/07/2013 04:46:52 PM) (Source: Dhcp) (User: )
Description: The IP address lease 10.1.1.6 for the Network Card with network address 0025111C2DB7 has been denied by the DHCP server 10.1.1.1 (The DHCP Server sent a DHCPNACK message).

Microsoft Office Sessions:
=========================
Error: (08/17/2013 03:27:46 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/14/2013 08:25:34 PM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/14 20:25:34.692]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 5

Error: (08/14/2013 08:25:33 PM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/14 20:25:33.678]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 5

Error: (08/14/2013 08:25:32 PM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/14 20:25:32.477]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/13/2013 11:46:45 AM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/13 11:46:45.480]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/13/2013 11:18:16 AM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/13 11:18:16.594]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/11/2013 10:30:48 PM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/11 22:30:48.254]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/11/2013 09:55:54 PM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/11 21:55:54.109]: [00002148]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 2

Error: (08/09/2013 01:59:32 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/07/2013 06:59:19 PM) (Source: Brother BrLog)(User: )
Description: STIBrtSTI: [2013/08/07 18:59:19.165]: [00002220]: CUsbScnDev: DeviceIoControl() failed. ErrorCode = 5

CodeIntegrity Errors:
===================================
  Date: 2013-08-17 19:44:30.932
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-08-17 19:44:30.823
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-08-17 19:44:30.698
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-08-17 19:44:30.589
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-05-08 20:21:03.288
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-05-08 20:21:03.163
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-05-08 20:21:03.007
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-05-08 20:21:02.882
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-05-08 20:21:02.757
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-05-08 20:21:02.633
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume2\Windows\System32\drivers\tcpip.sys because the set of per-page image hashes could not be found on the system.

=========================== Installed Programs ============================

Acer Arcade Deluxe (Version: 2.6.6326)
Acer eRecovery Management (Version: 4.00.3006)
Acer ScreenSaver (Version: 4.01.0718)
Acrobat.com (Version: 0.0.0)
Acrobat.com (Version: 1.1.377)
Adobe AIR (Version: 1.0.4990)
Adobe AIR (Version: 1.0.8.4990)
Adobe Flash Player 11 ActiveX (Version: 11.7.700.224)
Adobe Flash Player 11 Plugin (Version: 11.7.700.224)
Adobe Reader 9 (Version: 9.0.0)
Advanced System Protector (Version: 2.1.1000.10844)
Alice Greenfingers
Alien Shooter
Apple Application Support (Version: 2.1.5)
Apple Mobile Device Support (Version: 4.0.0.97)
Apple Software Update (Version: 2.1.3.127)
AV Input Selection (Version: 1.02.0047)
Bing Bar (Version: 7.0.850.0)
Bonjour (Version: 3.0.0.10)
Bookworm Adventures
Brother MFL-Pro Suite MFC-J430W (Version: 1.0.19.0)
C:\Program Files\Acer GameZone\GameConsole (Version: 2.0.1.6)
CDex - Open Source Digital Audio CD Extractor (Version: 1.70.4.2009)
Chicken Invaders 2
Compatibility Pack for the 2007 Office system (Version: 12.0.6612.1000)
CyberLink MediaShow (Version: 4.1.2325)
CyberLink PowerDirector (Version: 7.0.2514)
Dream Day First Home
eSobi v2 (Version: 2.0.3.000223)
FrostWire 4.18.1 (Version: 4.18.1.0)
Galapago
Go-Go Gourmet
Google Chrome (Version: 28.0.1500.95)
Google Drive (Version: 1.11.4865.2530)
Google Earth (Version: 7.1.1.1888)
Google SketchUp 7 (Version: 2.1.6860)
Google Toolbar for Internet Explorer (Version: 1.0.0)
Google Toolbar for Internet Explorer (Version: 7.5.4413.1752)
Google Update Helper (Version: 1.3.21.153)
Heroes of Hellas
IrfanView (remove only) (Version: 4.28)
iTunes (Version: 10.5.1.42)
Java Auto Updater (Version: 2.0.6.1)
Java™ 6 Update 30 (Version: 6.0.300)
JNLP
Junk Mail filter update (Version: 14.0.8117.416)
Logitech Vid (Version: 1.01.1015)
Logitech Webcam Software (Version: 12.00.1280)
Magic Farm
Magic Match Adventures
Malwarebytes' Anti-Malware
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft Application Error Reporting (Version: 12.0.6012.5000)
Microsoft Choice Guard (Version: 2.0.48.0)
Microsoft Office Live Add-in 1.3 (Version: 2.0.2313.0)
Microsoft Office PowerPoint Viewer 2007 (English) (Version: 12.0.6612.1000)
Microsoft Office Suite Activation Assistant (Version: 2.9)
Microsoft Office XP Professional with FrontPage (Version: 10.0.6626.0)
Microsoft Silverlight (Version: 5.1.20513.0)
Microsoft SQL Server 2005 Compact Edition [ENU] (Version: 3.1.0000)
Microsoft Sync Framework Runtime Native v1.0 (x86) (Version: 1.0.1215.0)
Microsoft Sync Framework Services Native v1.0 (x86) (Version: 1.0.1215.0)
Microsoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053 (Version: 8.0.50727.4053)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.59193)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Works (Version: 9.7.0621)
Mozilla Firefox 22.0 (x86 en-US) (Version: 22.0)
Mozilla Maintenance Service (Version: 22.0)
MSVCRT (Version: 14.0.1468.721)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
MSXML 4.0 SP3 Parser (KB973685) (Version: 4.30.2107.0)
MSXML 4.0 SP3 Parser (Version: 4.30.2100.0)
MyPC Backup  (Version: )
Mystery Solitaire - Secret Island
MyWinLocker (Version: 3.1.36.0)
NTI Backup Now 5 (Version: 5.1.2.616)
NTI Backup Now Standard (Version: 5.1.2.616)
NTI Media Maker 8 (Version: 8.0.2.6509)
Nuance PaperPort 12 (Version: 12.1.0000)
Nuance PDF Viewer Plus (Version: 5.30.3290)
NVIDIA Control Panel 307.83 (Version: 307.83)
NVIDIA Drivers
NVIDIA Graphics Driver 307.83 (Version: 307.83)
NVIDIA Install Application (Version: 2.1002.109.706)
NVIDIA Update 1.10.8 (Version: 1.10.8)
NVIDIA Update Components (Version: 1.10.8)
OGA Notifier 2.0.0048.0 (Version: 2.0.0048.0)
PaperPort Image Printer (Version: 1.00.0001)
PlayReady PC runtime (Version: 1)
Podium 1.7.3 eval
QuickTime (Version: 7.71.80.42)
Realtek High Definition Audio Driver (Version: 6.0.1.5789)
Reg Clean Pro Removal Tool (Version: 1.0)
Scansoft PDF Professional
Search Assistant WebSearch 1.74
Skype web features (Version: 1.0.3971)
Skype™ 5.10 (Version: 5.10.116)
Sony Ericsson PC Companion 1.60.13 (Version: 1.60.13)
Tango
Update for Microsoft .NET Framework 3.5 SP1 (KB963707) (Version: 1)
VaudiX 1.74
Visual C++ 8.0 CRT (x86) WinSXS MSM (Version: 8.0.50727.762)
Windows Live Call (Version: 14.0.8117.0416)
Windows Live Communications Platform (Version: 14.0.8117.416)
Windows Live Essentials (Version: 14.0.8117.0416)
Windows Live Essentials (Version: 14.0.8117.416)
Windows Live Mail (Version: 14.0.8117.0416)
Windows Live Messenger (Version: 14.0.8117.0416)
Windows Live Movie Maker (Version: 14.0.8117.0416)
Windows Live Photo Gallery (Version: 14.0.8117.416)
Windows Live Sign-in Assistant (Version: 5.000.818.6)
Windows Live Sync (Version: 14.0.8117.416)
Windows Live Upload Tool (Version: 14.0.8014.1029)
Windows Live Writer (Version: 14.0.8117.0416)

========================= Devices: ================================

Name: Microsoft PS/2 Mouse
Description: Microsoft PS/2 Mouse
Class Guid: {4d36e96f-e325-11ce-bfc1-08002be10318}
Manufacturer: Microsoft
Service: i8042prt
Problem: : This device is not present, is not working properly, or does not have all its drivers installed. (Code 24)
Resolution: The device is installed incorrectly. The problem could be a hardware failure, or a new driver might be needed.
Devices stay in this state if they have been prepared for removal.
After you remove the device, this error disappears.Remove the device, and this error should be resolved.

========================= Memory info: ===================================

Percentage of memory in use: 53%
Total physical RAM: 1790.51 MB
Available physical RAM: 833.1 MB
Total Pagefile: 3830.5 MB
Available Pagefile: 2327.35 MB
Total Virtual: 2047.88 MB
Available Virtual: 1946.11 MB

========================= Partitions: =====================================

1 Drive c: (ACER) (Fixed) (Total:141.04 GB) (Free:47.77 GB) NTFS
2 Drive d: (DATA) (Fixed) (Total:141.04 GB) (Free:140.25 GB) NTFS

========================= Users: ========================================

User accounts for \\HOME

Administrator            El Rose Stud             Elle                    
Guest                    sandra                   UpdatusUser             

**** End of log ****

 

 

 

 

 

 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Database version: v2013.08.16.07

Windows Vista Service Pack 1 x86 NTFS
Internet Explorer 8.0.6001.19088
El Rose Stud :: HOME [administrator]

17/08/2013 8:01:32 p.m.
mbam-log-2013-08-17 (20-01-32).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Shuriken | PUP | PUM
Scan options disabled: Heuristics/Extra | P2P
Objects scanned: 89455
Time elapsed: 15 minute(s), 40 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 1
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{DFCE14E7-5D33-83BF-640F-170C43D2898E} (PUP.Optional.Tarma.A) -> Quarantined and deleted successfully.

Registry Values Detected: 2
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Edapywgie (Trojan.Zbot) -> Data: "C:\Users\El Rose Stud\AppData\Roaming\Foge\etyv.exe" -> Quarantined and deleted successfully.
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Ihmaifz (Trojan.VBAgent.ED) -> Data: "C:\Users\El Rose Stud\AppData\Roaming\Awaw\ziagn.exe" -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 96
C:\Users\El Rose Stud\AppData\Roaming\Foge\etyv.exe (Trojan.Zbot) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Roaming\Awaw\ziagn.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\ProgramData\Sm5M6OaD.exe (Trojan.Agent.ED) -> Quarantined and deleted successfully.
C:\ProgramData\Sm5M6OaD.exe_ (Trojan.Agent.ED) -> Quarantined and deleted successfully.
C:\ProgramData\InstallMate\{EF153F4E-1A7D-4F38-ADD3-525F34F61DB8}\Setup.exe (PUP.Optional.Tarma.A) -> Quarantined and deleted successfully.
C:\ProgramData\InstallMate\{EF153F4E-1A7D-4F38-ADD3-525F34F61DB8}\TsuDll.dll (PUP.Optional.Tarma.A) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Roaming\Network Printer\NetPrint.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Roaming\Otdi\emug.exe (Trojan.Agent.ED) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Roaming\Temp\csrss.exe (Trojan.Proxy) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Roaming\Kixigo\noik.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\Documents\Downloads\IMAGE464-facebook.com.JPG.jpg.exe (Backdoor.LolBot) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp5acdd601.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\BN3C61.tmp (Backdoor.Agent.MB) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\BN422.tmp (Backdoor.Agent.MB) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\BN6BBB.tmp (Backdoor.Agent.MB) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\1.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\65064850.exe (Rootkit.0Access.RC) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\3.exe (Trojan.Agent) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\jeo8BC3.tmp (Adware.GabPath) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp040f7c7c.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\msimg32.dll (Rootkit.0Access.RC) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpcf6102f1.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpd05f0ec7.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpd2da97fc.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp452a5a10.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp17496f52.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp42f7c7e0.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\stub-9945.exe (Adware.Adparatus) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\~TM27A2.tmp (Trojan.Downloader) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\~TMC64.tmp (Trojan.Dropper) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\lK+z1NEJ.exe.part (PUP.Optional.Inbox) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp90408dbf.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp90d9adc5.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp702a86bd.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp844a7fe3.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp9cc2c166.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpb6807274.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpcf293eca.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpc95e68c7.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpcaea5673.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpcb17d0ca.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp0baa8167.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp0ca2c37c.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp1174ffa5.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp129380cc.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp50044cd6.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp54302415.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpec890285.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp24a21aaa.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp62ad6e36.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpc08f25c8.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpc1f3c432.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp7440fc21.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpd8e93aa2.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpaf0482e5.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp42cc797b.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp56dffeb8.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp5945b5da.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpe2d796d9.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpe3afc547.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpe56453fd.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpf63265a7.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp288e67ac.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp20b06677.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp47b82a3d.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp4c810143.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpc3b5be37.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpc4bc1c63.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpce21017c.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpfab3474c.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpfb967368.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp5e75b961.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp60642866.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp809956c7.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp390a1d20.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp9b0b86c0.exe (Trojan.Dropper.Gen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp70b07bb4\loader.exe (Backdoor.Bot) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp70cee539\ate.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp5234d466\toxo.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmped381170\toxo.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp1555ecdc\toxo.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmpa55de254\bt1.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\AppData\Local\Temp\tmp345bfe3e\toxo.exe (Trojan.VBAgent.ED) -> Quarantined and deleted successfully.
C:\Windows\Temp\SPA1A26.tmp\upgrade.exe (Adware.SpaceQuery) -> Quarantined and deleted successfully.
C:\Windows\Temp\SPA324.tmp\upgrade.exe (Adware.SpaceQuery) -> Quarantined and deleted successfully.
C:\Windows\Temp\SPA45F6.tmp\upgrade.exe (Adware.Agent.ZGen) -> Quarantined and deleted successfully.
C:\Windows\Temp\SPA5222.tmp\upgrade.exe (Adware.Agent.ZGen) -> Quarantined and deleted successfully.
C:\Windows\Temp\SPA61F5.tmp\upgrade.exe (Adware.SpaceQuery) -> Quarantined and deleted successfully.
C:\Windows\Temp\SPAF97E.tmp\upgrade.exe (Adware.Agent.ZGen) -> Quarantined and deleted successfully.
C:\Users\El Rose Stud\ahihl5egve419.exe (Trojan.Agent.ED) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7CTJDMBH\upgrade[1].cab (Adware.SpaceQuery) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\7CTJDMBH\upgrade[2].cab (Adware.Agent.ZGen) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\L22B5IS3\upgrade[1].cab (Adware.SpaceQuery) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\L22B5IS3\upgrade[2].cab (Adware.Agent.ZGen) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\QGBES5KF\upgrade[1].cab (Adware.Agent.ZGen) -> Quarantined and deleted successfully.
C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\QYO27W1S\upgrade[1].cab (Adware.SpaceQuery) -> Quarantined and deleted successfully.

(end)

 

 

 

 

 

 

Malwarebytes Anti-Rootkit BETA 1.06.1.1005
www.malwarebytes.org

Database version: v2013.08.16.07

Windows Vista Service Pack 1 x86 NTFS
Internet Explorer 8.0.6001.19088
El Rose Stud :: HOME [administrator]

17/08/2013 8:32:45 p.m.
mbar-log-2013-08-17 (20-32-45).txt

Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUM | P2P
Scan options disabled: PUP
Objects scanned: 369110
Time elapsed: 1 hour(s), 10 minute(s), 47 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 2
HKCU\SOFTWARE\FLV Direct Player (Adware.FLVPlayer) -> No action taken.
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\kbiwkmeqiuejxf (Rootkit.TDSS) -> No action taken.

Registry Values Detected: 2
HKCU\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Shell (Worm.AutoRun) -> Data: C:\Users\El Rose Stud\AppData\Roaming\ebzbg.exe,explorer.exe,C:\RECYCLER\S-1-5-21-2724394737-8552066653-035940086-0510\yv8g67.exe -> No action taken.
HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Windows Print Spooler (Trojan.Agent) -> Data: C:\Users\El Rose Stud\AppData\Roaming\Temp\spoolsv.exe -> No action taken.

Registry Data Items Detected: 1
HKCU\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Shell (Hijack.Shell) -> Bad: (C:\Users\El Rose Stud\AppData\Roaming\ebzbg.exe,explorer.exe,C:\RECYCLER\S-1-5-21-2724394737-8552066653-035940086-0510\yv8g67.exe) Good: (Explorer.exe) -> No action taken.

Folders Detected: 4
c:\Users\El Rose Stud\AppData\Local\Temp\AdparatusTemp (Adware.Adparatus) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U (Trojan.Siredef.C) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\L (Trojan.Siredef.C) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932 (Trojan.Siredef.C) -> No action taken.

Files Detected: 24
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\@ (Trojan.Siredef.C) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\2298690.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\4421566.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\4792764.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\6092968.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\6209810.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\7043265.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\7697452.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\8217276.exe (Trojan.Agent) -> No action taken.
c:\Users\El Rose Stud\AppData\Roaming\avdrn.dat (Malware.Trace) -> No action taken.
c:\Users\Public\Desktop\FLV Direct Player.lnk (Adware.BHO.FL) -> No action taken.
c:\Windows\System32\drivers\str.sys (Rootkit.Agent) -> No action taken.
c:\Windows\System32\kbiwkmqcfyhose.dat (Rootkit.TDSS) -> No action taken.
c:\Windows\System32\kbiwkmrmtvppyn.dat (Rootkit.TDSS) -> No action taken.
c:\Users\El Rose Stud\AppData\Local\Temp\adparatus.installer.log (Adware.Adparatus) -> No action taken.
c:\Users\El Rose Stud\oashdihasidhasuidhiasdhiashdiuasdhasd (Malware.Trace) -> No action taken.
c:\Users\El Rose Stud\secupdat.dat (Worm.Autorun) -> No action taken.
c:\Users\El Rose Stud\AppData\Roaming\Temp\spoolsv.exe (Trojan.Agent) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\00000004.@ (Trojan.Siredef.C) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\00000008.@ (Trojan.Siredef.C) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\000000cb.@ (Trojan.Siredef.C) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\80000000.@ (Trojan.Siredef.C) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\80000032.@ (Trojan.Siredef.C) -> No action taken.
c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\L\00000004.@ (Trojan.Siredef.C) -> No action taken.

Physical Sectors Detected: 0
(No malicious items detected)

(end)

 

 

 

 

 

 

---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.06.1.1005

© Malwarebytes Corporation 2011-2012

OS version: 6.0.6001 Windows Vista Service Pack 1 x86

Account is Administrative

Internet Explorer version: 8.0.6001.19088

Java version: 1.6.0_30

File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 2.500000 GHz
Memory total: 1877483520, free: 832286720

Downloaded database version: v2013.08.16.07
Initializing...
------------ Kernel report ------------
     08/17/2013 20:32:40
------------ Loaded modules -----------
\SystemRoot\system32\ntkrnlpa.exe
\SystemRoot\system32\hal.dll
\SystemRoot\system32\kdcom.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\BOOTVID.dll
\SystemRoot\system32\CLFS.SYS
\SystemRoot\system32\CI.dll
\SystemRoot\System32\drivers\wyjhrqmv.sys
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\acpi.sys
\SystemRoot\system32\drivers\WMILIB.SYS
\SystemRoot\system32\drivers\msisadrv.sys
\SystemRoot\system32\drivers\pci.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\system32\drivers\pciide.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\System32\Drivers\UBHelper.sys
\SystemRoot\system32\drivers\atapi.sys
\SystemRoot\system32\drivers\ataport.SYS
\SystemRoot\system32\DRIVERS\nvstor32.sys
\SystemRoot\system32\DRIVERS\storport.sys
\SystemRoot\system32\drivers\fltmgr.sys
\SystemRoot\system32\drivers\fileinfo.sys
\SystemRoot\System32\Drivers\ksecdd.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\msrpc.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\Drivers\Ntfs.sys
\SystemRoot\system32\drivers\wd.sys
\SystemRoot\system32\drivers\volsnap.sys
\SystemRoot\System32\Drivers\spldr.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\System32\drivers\ecache.sys
\SystemRoot\system32\drivers\disk.sys
\SystemRoot\system32\drivers\CLASSPNP.SYS
\SystemRoot\system32\drivers\crcdisk.sys
\SystemRoot\system32\DRIVERS\tunnel.sys
\SystemRoot\system32\DRIVERS\tunmp.sys
\SystemRoot\system32\DRIVERS\intelppm.sys
\SystemRoot\system32\DRIVERS\serial.sys
\SystemRoot\system32\DRIVERS\serenum.sys
\SystemRoot\system32\DRIVERS\mouclass.sys
\SystemRoot\system32\DRIVERS\usbohci.sys
\SystemRoot\system32\DRIVERS\USBPORT.SYS
\SystemRoot\system32\DRIVERS\usbehci.sys
\SystemRoot\system32\DRIVERS\HDAudBus.sys
\SystemRoot\system32\DRIVERS\ohci1394.sys
\SystemRoot\system32\DRIVERS\1394BUS.SYS
\SystemRoot\system32\DRIVERS\cdrom.sys
\SystemRoot\system32\DRIVERS\NTIDrvr.sys
\SystemRoot\system32\DRIVERS\GEARAspiWDM.sys
\SystemRoot\system32\DRIVERS\nvmfdx32.sys
\SystemRoot\system32\DRIVERS\nvlddmkm.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\system32\DRIVERS\wmiacpi.sys
\SystemRoot\system32\DRIVERS\msiscsi.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\system32\DRIVERS\rasl2tp.sys
\SystemRoot\system32\DRIVERS\ndistapi.sys
\SystemRoot\system32\DRIVERS\ndiswan.sys
\SystemRoot\system32\DRIVERS\raspppoe.sys
\SystemRoot\system32\DRIVERS\raspptp.sys
\SystemRoot\system32\DRIVERS\rassstp.sys
\SystemRoot\system32\DRIVERS\termdd.sys
\SystemRoot\system32\DRIVERS\kbdclass.sys
\SystemRoot\system32\DRIVERS\swenum.sys
\SystemRoot\system32\DRIVERS\ks.sys
\SystemRoot\system32\DRIVERS\mssmbios.sys
\SystemRoot\system32\DRIVERS\umbus.sys
\SystemRoot\system32\DRIVERS\usbhub.sys
\SystemRoot\System32\Drivers\NDProxy.SYS
\SystemRoot\system32\drivers\RTKVHDA.sys
\SystemRoot\system32\drivers\portcls.sys
\SystemRoot\system32\drivers\drmk.sys
\SystemRoot\system32\drivers\nvhda32v.sys
\SystemRoot\System32\Drivers\Fs_Rec.SYS
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\system32\DRIVERS\i8042prt.sys
\SystemRoot\system32\DRIVERS\HIDPARSE.SYS
\SystemRoot\System32\drivers\vga.sys
\SystemRoot\System32\drivers\VIDEOPRT.SYS
\SystemRoot\System32\DRIVERS\RDPCDD.sys
\SystemRoot\system32\drivers\rdpencdd.sys
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\System32\DRIVERS\rasacd.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\smb.sys
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\DRIVERS\pacer.sys
\SystemRoot\system32\DRIVERS\netbios.sys
\SystemRoot\system32\DRIVERS\wanarp.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\usbccgp.sys
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\system32\DRIVERS\usbprint.sys
\SystemRoot\system32\DRIVERS\usbscan.sys
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\Drivers\dump_diskdump.sys
\SystemRoot\System32\Drivers\dump_nvstor32.sys
\SystemRoot\system32\DRIVERS\hidusb.sys
\SystemRoot\system32\DRIVERS\HIDCLASS.SYS
\SystemRoot\system32\DRIVERS\mouhid.sys
\SystemRoot\system32\DRIVERS\kbdhid.sys
\SystemRoot\system32\DRIVERS\USBSTOR.SYS
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\Dxapi.sys
\SystemRoot\system32\DRIVERS\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\system32\drivers\luafv.sys
\SystemRoot\system32\DRIVERS\mwlPSDFilter.sys
\SystemRoot\system32\drivers\spsys.sys
\SystemRoot\system32\DRIVERS\lltdio.sys
\SystemRoot\system32\DRIVERS\rspndr.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\drivers\mrxdav.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\system32\DRIVERS\mwlPSDNServ.sys
\SystemRoot\system32\DRIVERS\mwlPSDVDisk.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\Drivers\secdrv.SYS
\SystemRoot\System32\drivers\tcpipreg.sys
\SystemRoot\system32\DRIVERS\WUDFRd.sys
\SystemRoot\system32\DRIVERS\WUDFPf.sys
\SystemRoot\system32\DRIVERS\LVPr2Mon.sys
\SystemRoot\system32\DRIVERS\cdfs.sys
\??\C:\Windows\system32\drivers\mbamchameleon.sys
\??\C:\Windows\system32\drivers\mbamswissarmy.sys
\Windows\System32\ntdll.dll
----------- End -----------
Done!
<<<1>>>
Upper Device Name: \Device\Harddisk2\DR2
Upper Device Object: 0xffffffff87616400
Upper Device Driver Name: \Driver\disk\
Lower Device Name: \Device\0000006c\
Lower Device Object: 0xffffffff87483cd0
Lower Device Driver Name: \Driver\USBSTOR\
<<<1>>>
Upper Device Name: \Device\Harddisk1\DR1
Upper Device Object: 0xffffffff87616ac8
Upper Device Driver Name: \Driver\disk\
Lower Device Name: \Device\0000006b\
Lower Device Object: 0xffffffff87618250
Lower Device Driver Name: \Driver\USBSTOR\
<<<1>>>
Upper Device Name: \Device\Harddisk0\DR0
Upper Device Object: 0xffffffff85a88ac8
Upper Device Driver Name: \Driver\disk\
Lower Device Name: \Device\00000051\
Lower Device Object: 0xffffffff846bac90
Lower Device Driver Name: \Driver\nvstor32\
<<<2>>>
Device number: 0, partition: 2
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffffff85a88ac8, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff85a887b8, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffffff85a88ac8, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
DevicePointer: 0xffffffff8548c700, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xffffffff846bac90, DeviceName: \Device\00000051\, DriverName: \Driver\nvstor32\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
Device number: 0, partition: 2
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\Windows\system32\drivers...
<<<2>>>
Device number: 0, partition: 2
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Done!
Drive 0
Scanning MBR on drive 0...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: E5956B8F

Partition information:

    Partition 0 type is Other (0x27)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 2048  Numsec = 33554432

    Partition 1 type is Primary (0x7)
    Partition is ACTIVE.
    Partition starts at LBA: 33556480  Numsec = 295790592
    Partition file system is NTFS
    Partition is bootable

    Partition 2 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 329347072  Numsec = 295792640

    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0

Disk Size: 320072933376 bytes
Sector size: 512 bytes

Scanning physical sectors of unpartitioned space on drive 0 (1-2047-625122448-625142448)...
Done!
Physical Sector Size: 0
Drive: 1, DevicePointer: 0xffffffff87616ac8, DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff874839c0, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffffff87616ac8, DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\disk\
DevicePointer: 0xffffffff87618250, DeviceName: \Device\0000006b\, DriverName: \Driver\USBSTOR\
------------ End ----------
Physical Sector Size: 0
Drive: 2, DevicePointer: 0xffffffff87616400, DeviceName: \Device\Harddisk2\DR2\, DriverName: \Driver\disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff874a5d20, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffffff87616400, DeviceName: \Device\Harddisk2\DR2\, DriverName: \Driver\disk\
DevicePointer: 0xffffffff87483cd0, DeviceName: \Device\0000006c\, DriverName: \Driver\USBSTOR\
------------ End ----------
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\@ --> [Trojan.Siredef.C]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\2298690.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\4421566.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\4792764.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\6092968.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\6209810.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\7043265.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\7697452.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\8217276.exe --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Roaming\avdrn.dat --> [Malware.Trace]
Infected: c:\Users\Public\Desktop\FLV Direct Player.lnk --> [Adware.BHO.FL]
File c:\Windows\System32\drivers\str.sys will be destroyed
Infected: c:\Windows\System32\drivers\str.sys --> [Rootkit.Agent]
Infected: c:\Windows\System32\kbiwkmqcfyhose.dat --> [Rootkit.TDSS]
Infected: c:\Windows\System32\kbiwkmrmtvppyn.dat --> [Rootkit.TDSS]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\adparatus.installer.log --> [Adware.Adparatus]
Infected: c:\Users\El Rose Stud\oashdihasidhasuidhiasdhiashdiuasdhasd --> [Malware.Trace]
Infected: c:\Users\El Rose Stud\secupdat.dat --> [Worm.Autorun]
Infected: HKCU\SOFTWARE\FLV Direct Player --> [Adware.FLVPlayer]
Infected: HKCU\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Shell --> [Worm.AutoRun]
Infected: HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|Windows Print Spooler --> [Trojan.Agent]
Infected: c:\Users\El Rose Stud\AppData\Roaming\Temp\spoolsv.exe --> [Trojan.Agent]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\kbiwkmeqiuejxf --> [Rootkit.TDSS]
Infected: c:\Users\El Rose Stud\AppData\Local\Temp\AdparatusTemp --> [Adware.Adparatus]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\00000004.@ --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\00000008.@ --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\000000cb.@ --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\80000000.@ --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\U\80000032.@ --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\L --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932\L\00000004.@ --> [Trojan.Siredef.C]
Infected: c:\$Recycle.Bin\S-1-5-21-1371311046-699996760-777523849-1000\$3ff23c7b88d5febaa41795a7de927932 --> [Trojan.Siredef.C]
Infected: HKCU\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Shell --> [Hijack.Shell]
Scan finished
=======================================

Removal queue found; removal started
Removing c:\programdata\malwarebytes' anti-malware (portable)\mbr_0_i.mbam...
Removing c:\programdata\malwarebytes' anti-malware (portable)\bootstrap_0_1_33556480_i.mbam...
Removing c:\programdata\malwarebytes' anti-malware (portable)\mbr_0_r.mbam...
Removing c:\programdata\malwarebytes' anti-malware (portable)\str.sys_k.mbam...
Removing c:\programdata\malwarebytes' anti-malware (portable)\str.sys_u.mbam...
Removing c:\programdata\malwarebytes' anti-malware (portable)\str.sys_r.mbam...
Removal finished

 

 

 

 

 

 

Rkill 2.6.1 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2013 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 08/18/2013 11:48:19 AM in x86 mode.
Windows Version: Windows Vista ™ Home Premium Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * Modified HKCU\...\Winlogon: [Shell] => C:\Users\El Rose Stud\AppData\Roaming\ebzbg.exe,explorer.exe,C:\RECYCLER\S-1-5-21-2724394737-8552066653-035940086-0510\yv8g67.exe

 * No issues found.

Checking Windows Service Integrity:

 * No issues found.

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1       localhost
  ::1             localhost

Program finished at: 08/18/2013 11:49:28 AM
Execution time: 0 hours(s), 1 minute(s), and 8 seconds(s)



#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,716 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:02:48 PM

Posted 17 August 2013 - 08:27 PM

You're infected with ZeroAccess rootkit.

It'll require elevated help.

 

Please follow the instructions in THIS GUIDE starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it HERE. Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users