Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Explorer.exe high cpu and fake movie files in media tools folder


  • Please log in to reply
5 replies to this topic

#1 keiferhelms

keiferhelms

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:10:13 PM

Posted 30 August 2013 - 05:26 PM

Ok first here is a C&P of my system info:

 

OS Name Microsoft Windows 7 Ultimate
Version 6.1.7601 Service Pack 1 Build 7601
Other OS Description Not Available
OS Manufacturer Microsoft Corporation
System Name KEIFER-PC
System Manufacturer Dell Inc.
System Model OptiPlex GX620
System Type X86-based PC
Processor Intel® Pentium® D CPU 3.20GHz, 3192 Mhz, 2 Core(s), 2 Logical Processor(s)
BIOS Version/Date Dell Inc. A11, 11/30/2006
SMBIOS Version 2.3
Windows Directory C:\Windows
System Directory C:\Windows\system32
Boot Device \Device\HarddiskVolume1
Locale United States
Hardware Abstraction Layer Version = "6.1.7601.17514"
User Name keifer-PC\keifer
Time Zone Central Daylight Time
Installed Physical Memory (RAM) 2.00 GB
Total Physical Memory 1.99 GB
Available Physical Memory 1.42 GB
Total Virtual Memory 3.98 GB
Available Virtual Memory 3.44 GB
Page File Space 1.99 GB
Page File C:\pagefile.sys

 

 

Now on to the problem.

 

Latley i have noticed explorer.exe having around 50% cpu. (I have process explorer)  So i ran malwarebytes and it found a few things so i removed them.  After restart, System process was at 50% but explorer.exe was ok.  So i restarted again and the system process was ok but explorer.exe was back at 50%.  I also ran Spybot and found some more stuff that i removed.  Told spybot to run at startup but it got hung about 10% into it so just restarted.  Also i ran AVG 2013 scan and found no issues.  All programs are up to date.

After all that the problem wasnt fixed.

 

When watching malwarebytes run i noticed it scanning a ton of movie files in

C:\ProgramData\Microsoft\Media Tools\plugins\mediahash\downloads folder so i went an looked at the folder and it has like 750GB worth of movies there that are corrupt or something.  What is weird is my HDD is only 74.4 GB with 22.5 GB free.  

So i tried to delete the whole media tools folder but windows says another program is using it so i cant delete.  i tried to remove each movie folder individually with the same result.  Tried to delete in safe mode with same result.

I wont lie, i do dabble in cracks and stuff (i dont create them, just test/use them) and yes i know its risky but usually know how to watch out but they got me this time and i cant figure it out.  

I have been downloading some movies and do recognize some in the folder in question but there are also many that i dont.  

 

i have been helped here before so im sure someone will know what to do.

Thanx in advance



BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:09:13 PM

Posted 30 August 2013 - 08:52 PM

p22002970.gif Download Security Check from here or here and save it to your Desktop.

  • Double-click SecurityCheck.exe
  • Follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.

p22002970.gif Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


p22002970.gif Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size

Click Go and post the result.

p22002970.gif Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

p22002970.gifDownload Malwarebytes Anti-Rootkit from HERE to your Desktop.
  • Unzip downloaded file.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • DO NOT click on the Cleanup button. Simply exit the program.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt


p22002970.gif Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.


If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

NOTE Do NOT wrap your logs in "quote" or "code" brackets.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 keiferhelms

keiferhelms
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:10:13 PM

Posted 30 August 2013 - 10:35 PM

Security Check log:

 

 

Results of screen317's Security Check version 0.99.73
Windows 7 Service Pack 1 x86 (UAC is disabled!)
Internet Explorer 10
``````````````Antivirus/Firewall Check:``````````````
Windows Security Center service is not running! This report may not be accurate!
AVG Internet Security 2013
Antivirus out of date!
`````````Anti-malware/Other Utilities Check:`````````
MVPS Hosts File
Spybot - Search & Destroy
Malwarebytes Anti-Malware version 1.75.0.1300
TuneUp Companion 2.2.7
CCleaner
Java 7 Update 21
Java version out of Date!
Adobe Flash Player 11.8.800.94
Adobe Reader 10.1.7 Adobe Reader out of Date!
Mozilla Firefox (23.0.1)
Google Chrome 29.0.1547.57
Google Chrome 29.0.1547.62
Google Chrome plugins...
````````Process Check: objlist.exe by Laurent````````
AVG avgwdsvc.exe
AVG avgrsx.exe
AVG avgnsx.exe
AVG avgemc.exe
Malwarebytes' Anti-Malware mbamscheduler.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 10%
````````````````````End of Log``````````````````````

 

 

Fss Log:

 

 

Farbar Service Scanner Version: 28-08-2013
Ran by keifer (administrator) on 30-08-2013 at 21:30:50
Running from "C:\Users\keifer\Desktop"
Microsoft Windows 7 Ultimate Service Pack 1 (X86)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.


Windows Firewall:
=============
mpsdrv Service is not running. Checking service configuration:
The start type of mpsdrv service is OK.
The ImagePath of mpsdrv service is OK.

MpsSvc Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open MpsSvc registry key. The service key does not exist.

bfe Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open bfe registry key. The service key does not exist.


Firewall Disabled Policy:
==================
"HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" registry key does not exist.


System Restore:
============

System Restore Disabled Policy:
========================


Action Center:
============

wscsvc Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open wscsvc registry key. The service key does not exist.

Action Center Notification Icon =====> Unable to open HKLM\...\ShellServiceObjects\{F56F6FDD-AA9D-4618-A949-C1B91AF43B1A} key. The key does not exist.


Windows Update:
============
wuauserv Service is not running. Checking service configuration:
The start type of wuauserv service is set to Disabled. The default start type is Auto.
The ImagePath of wuauserv service is OK.
The ServiceDll of wuauserv service is OK.


Windows Autoupdate Disabled Policy:
============================


Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
Checking Start type: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist.
Checking ImagePath: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist.
Checking ServiceDll: ATTENTION!=====> Unable to open WinDefend registry key. The service key does not exist.


Windows Defender Disabled Policy:
==========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware"=DWORD:1


Other Services:
==============
Checking Start type of SharedAccess: ATTENTION!=====> Unable to retrieve start type of SharedAccess. The value does not exist.
Checking ImagePath of SharedAccess: ATTENTION!=====> Unable to retrieve ImagePath of SharedAccess. The value does not exist.
Checking ServiceDll of SharedAccess: ATTENTION!=====> Unable to retrieve ServiceDll of SharedAccess. The value does not exist.
Checking FirewallRules of SharedAccess: ATTENTION!=====> Unable to open "SharedAccess\Defaults\FirewallPolicy\FirewallRules" registry key. The key does not exist.
Checking Start type of iphlpsvc: ATTENTION!=====> Unable to open iphlpsvc registry key. The service key does not exist.
Checking ImagePath of iphlpsvc: ATTENTION!=====> Unable to open iphlpsvc registry key. The service key does not exist.
Checking ServiceDll of iphlpsvc: ATTENTION!=====> Unable to open iphlpsvc registry key. The service key does not exist.


File Check:
========
C:\Windows\system32\nsisvc.dll => MD5 is legit
C:\Windows\system32\Drivers\nsiproxy.sys => MD5 is legit
C:\Windows\system32\dhcpcore.dll => MD5 is legit
C:\Windows\system32\Drivers\afd.sys => MD5 is legit
C:\Windows\system32\Drivers\tdx.sys => MD5 is legit
C:\Windows\system32\Drivers\tcpip.sys
[2013-08-18 17:20] - [2013-07-06 00:05] - 1293760 ____A (Microsoft Corporation) 4E8B9BE71B807B3BAEDB7F4243F85E3C

C:\Windows\system32\dnsrslvr.dll => MD5 is legit
C:\Windows\system32\mpssvc.dll => MD5 is legit
C:\Windows\system32\bfe.dll => MD5 is legit
C:\Windows\system32\Drivers\mpsdrv.sys => MD5 is legit
C:\Windows\system32\SDRSVC.dll => MD5 is legit
C:\Windows\system32\vssvc.exe => MD5 is legit
C:\Windows\system32\wscsvc.dll => MD5 is legit
C:\Windows\system32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\system32\wuaueng.dll => MD5 is legit
C:\Windows\system32\qmgr.dll => MD5 is legit
C:\Windows\system32\es.dll => MD5 is legit
C:\Windows\system32\cryptsvc.dll
[2013-08-18 17:21] - [2013-07-08 23:46] - 0140288 ____A (Microsoft Corporation) 7CA1BECEA5DE2643ADDAD32670E7A4C9


ATTENTION!=====> C:\Program Files\Windows Defender\MpSvc.dll Reparse point on file detected.

C:\Windows\system32\ipnathlp.dll => MD5 is legit
C:\Windows\system32\iphlpsvc.dll => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\rpcss.dll => MD5 is legit


**** End of log ****

 

MiniToolbox log:

 

 

MiniToolBox by Farbar Version: 13-07-2013
Ran by keifer (administrator) on 30-08-2013 at 21:32:22
Running from "C:\Users\keifer\Desktop"
Microsoft Windows 7 Ultimate Service Pack 1 (X86)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
ProxyServer: http=;ftp=;https=;

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================


127.0.0.1 www.sendblaster.com
127.0.0.1 sendblaster.com
127.0.0.1 93.94.29.25
127.0.0.1 109.168.105.172
127.0.0.1 66.249.72.149
127.0.0.1 licensing.sendblaster.com
127.0.0.1 mailserver.sendblaster.com
127.0.0.1 www.007guard.com
127.0.0.1 007guard.com
127.0.0.1 008i.com
127.0.0.1 www.008k.com
127.0.0.1 008k.com
127.0.0.1 www.00hq.com
127.0.0.1 00hq.com
127.0.0.1 010402.com
127.0.0.1 www.032439.com
127.0.0.1 032439.com
127.0.0.1 www.0scan.com
127.0.0.1 0scan.com

There are 15477 more lines starting with "127.0.0.1"

========================= IP Configuration: ================================

Broadcom NetXtreme 57xx Gigabit Controller = Local Area Connection (Connected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled taskoffload=disabled


popd
# End of IPv4 configuration



Windows IP Configuration

Host Name . . . . . . . . . . . . : keifer-PC
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Broadcom NetXtreme 57xx Gigabit Controller
Physical Address. . . . . . . . . : 00-14-22-42-6E-77
DHCP Enabled. . . . . . . . . . . : Yes
Autoconfiguration Enabled . . . . : Yes
Link-local IPv6 Address . . . . . : fe80::64c7:76d9:b4a9:119e%11(Preferred)
IPv4 Address. . . . . . . . . . . : 192.168.1.103(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Lease Obtained. . . . . . . . . . : Friday, August 30, 2013 5:41:29 PM
Lease Expires . . . . . . . . . . : Saturday, August 31, 2013 5:41:28 PM
Default Gateway . . . . . . . . . : 192.168.1.1
DHCP Server . . . . . . . . . . . : 192.168.1.1
DHCPv6 IAID . . . . . . . . . . . : 234886178
DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-19-0B-6C-9A-00-14-22-42-6E-77
DNS Servers . . . . . . . . . . . : 208.180.42.68
208.180.42.100
NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter isatap.{75FEC24B-2771-4A91-B163-CA167A081F69}:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes

Tunnel adapter Local Area Connection* 11:

Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
Server: rdns01.suddenlink.net
Address: 208.180.42.68

Name: google.com
Addresses: 2607:f8b0:4000:801::1006
74.125.227.131
74.125.227.132
74.125.227.133
74.125.227.134
74.125.227.135
74.125.227.136
74.125.227.137
74.125.227.142
74.125.227.128
74.125.227.129
74.125.227.130


Pinging google.com [74.125.227.132] with 32 bytes of data:
Reply from 74.125.227.132: bytes=32 time=17ms TTL=53
Reply from 74.125.227.132: bytes=32 time=18ms TTL=53

Ping statistics for 74.125.227.132:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 17ms, Maximum = 18ms, Average = 17ms
Server: rdns01.suddenlink.net
Address: 208.180.42.68

Name: yahoo.com
Addresses: 206.190.36.45
98.138.253.109
98.139.183.24


Pinging yahoo.com [98.138.253.109] with 32 bytes of data:
Reply from 98.138.253.109: bytes=32 time=82ms TTL=48
Reply from 98.138.253.109: bytes=32 time=85ms TTL=48

Ping statistics for 98.138.253.109:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 82ms, Maximum = 85ms, Average = 83ms

Pinging 127.0.0.1 with 32 bytes of data:
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<1ms TTL=128

Ping statistics for 127.0.0.1:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 0ms, Average = 0ms
===========================================================================
Interface List
11...00 14 22 42 6e 77 ......Broadcom NetXtreme 57xx Gigabit Controller
1...........................Software Loopback Interface 1
12...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
13...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.103 20
127.0.0.0 255.0.0.0 On-link 127.0.0.1 306
127.0.0.1 255.255.255.255 On-link 127.0.0.1 306
127.255.255.255 255.255.255.255 On-link 127.0.0.1 306
192.168.1.0 255.255.255.0 On-link 192.168.1.103 276
192.168.1.103 255.255.255.255 On-link 192.168.1.103 276
192.168.1.255 255.255.255.255 On-link 192.168.1.103 276
224.0.0.0 240.0.0.0 On-link 127.0.0.1 306
224.0.0.0 240.0.0.0 On-link 192.168.1.103 276
255.255.255.255 255.255.255.255 On-link 127.0.0.1 306
255.255.255.255 255.255.255.255 On-link 192.168.1.103 276
===========================================================================
Persistent Routes:
None

IPv6 Route Table
===========================================================================
Active Routes:
If Metric Network Destination Gateway
1 306 ::1/128 On-link
11 276 fe80::/64 On-link
11 276 fe80::64c7:76d9:b4a9:119e/128
On-link
1 306 ff00::/8 On-link
11 276 ff00::/8 On-link
===========================================================================
Persistent Routes:
None
========================= Winsock entries =====================================

Catalog5 01 mswsock.dll [File Not found] (Microsoft Corporation)
ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"

Catalog5 02 C:\Windows\system32\napinsp.dll [52224] (Microsoft Corporation)
Catalog5 03 C:\Windows\system32\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 04 C:\Windows\system32\pnrpnsp.dll [65024] (Microsoft Corporation)
Catalog5 05 mswsock.dll [File Not found] (Microsoft Corporation)
ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"

Catalog5 06 C:\Windows\system32\winrnr.dll [20992] (Microsoft Corporation)
Catalog5 07 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [145648] (Microsoft Corp.)
Catalog5 08 C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDNSP.DLL [145648] (Microsoft Corp.)
Catalog5 09 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Catalog9 01 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 02 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 03 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 04 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 05 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 06 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 07 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 08 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 09 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 10 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 11 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 12 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 13 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 14 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 15 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 16 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 17 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 18 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 19 mswsock.dll [File not found] (Microsoft Corporation)
Catalog9 20 mswsock.dll [File not found] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (08/30/2013 05:43:01 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 04:43:22 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 04:37:08 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 04:30:52 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 02:56:33 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 02:51:58 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 02:47:40 PM) (Source: Software Protection Platform Service) (User: )
Description: The Software Protection service failed to start. 0xD000010A
6.1.7601.17514

Error: (08/30/2013 02:44:57 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 10:13:57 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 08:01:26 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003


System errors:
=============
Error: (08/30/2013 09:33:26 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for rddiskVolume2\PROGRAM FILES\AVG\AVG2013\AVGWDSVC.EXE

Error: (08/30/2013 09:33:26 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for HarddiskVolume2\PROGRAM FILES\AVG\AVG2013\AVGFWS.EXE

Error: (08/30/2013 09:33:25 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for rddiskVolume2\PROGRAM FILES\AVG\AVG2013\AVGWDSVC.EXE

Error: (08/30/2013 09:33:25 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for HarddiskVolume2\PROGRAM FILES\AVG\AVG2013\AVGFWS.EXE

Error: (08/30/2013 09:33:25 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for rddiskVolume2\Program Files\AVG\AVG2013\avgwdsvc.exe

Error: (08/30/2013 09:33:25 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for HarddiskVolume2\Program Files\AVG\AVG2013\avgfws.exe

Error: (08/30/2013 09:33:23 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for rddiskVolume2\PROGRAM FILES\AVG\AVG2013\AVGWDSVC.EXE

Error: (08/30/2013 09:33:22 PM) (Source: mbamchameleon) (User: )
Description: Failed to verify the digital signature for HarddiskVolume2\PROGRAM FILES\AVG\AVG2013\AVGFWS.EXE

Error: (08/30/2013 05:41:58 PM) (Source: WMPNetworkSvc) (User: )
Description: 0x80070422

Error: (08/30/2013 05:41:58 PM) (Source: WMPNetworkSvc) (User: )
Description: 0x80070422


Microsoft Office Sessions:
=========================
Error: (08/30/2013 05:43:01 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 04:43:22 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 04:37:08 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 04:30:52 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 02:56:33 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 02:51:58 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 02:47:40 PM) (Source: Software Protection Platform Service)(User: )
Description: 0xD000010A6.1.7601.17514

Error: (08/30/2013 02:44:57 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 10:13:57 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (08/30/2013 08:01:26 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003


=========================== Installed Programs ============================

AceHTML Freeware (Version: Build 11)
Adobe Flash Player 11 ActiveX (Version: 11.8.800.94)
Adobe Flash Player 11 Plugin (Version: 11.8.800.94)
Adobe Reader X (10.1.7) (Version: 10.1.7)
Angry Birds Star Wars (Version: 1.2.0)
Any Video Converter 5.0.6
AnyDVD (Version: 7.3.1.0)
Apple Application Support (Version: 2.3.4)
Apple Mobile Device Support (Version: 6.1.0.13)
Apple Software Update (Version: 2.1.3.127)
Audacity 2.0
AVG 2013 (Version: 13.0.3211)
AVG 2013 (Version: 13.0.3392)
AVG 2013 (Version: 2013.0.3392)
AVG PC TuneUp 10.0.0.27 PreCracked
AVS Ringtone Maker version 1.6
AVS Update Manager 1.0
AVS4YOU Software Navigator 1.3
Bonjour (Version: 3.0.0.10)
CCleaner (Version: 4.02)
ColorPic (Version: 4.1)
Corel DVD MovieFactory 7 (Version: 7.0.0)
Coupon Printer for Windows (Version: 5.0.0.3)
D3DX10 (Version: 15.4.2368.0902)
Drivers For Free Unlimited (Version: 8.1)
DVDFab 9.0.4.2 (27/05/2013)
EPSON NX100 Series Printer Uninstall
EPSON Scan
FileZilla Client 3.7.1 (Version: 3.7.1)
FormatFactory 3.1.1 (Version: 3.1.1)
Free Studio version 2013 (Version: 6.1.1.430)
GIMP 2.6.11 (Version: 2.6.11)
Google Chrome (Version: 29.0.1547.62)
Google Talk Plugin (Version: 4.5.3.14917)
Google Update Helper (Version: 1.3.21.153)
HxD Hex Editor version 1.7.7.0 (Version: 1.7.7.0)
ImgBurn (Version: 2.5.7.0)
Intel® Graphics Media Accelerator Driver (Version: 8.15.10.1930)
iTunes (Version: 11.0.5.5)
Java 7 Update 21 (Version: 7.0.210)
Java Auto Updater (Version: 2.1.9.5)
Jing (Version: 2.8.13007.1)
K-Lite Codec Pack 7.0.0 (Standard) (Version: 7.0.0)
Malwarebytes Anti-Malware version 1.75.0.1300 (Version: 1.75.0.1300)
Mask My IP (Version: 2.3.8.6)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft .NET Framework 4 Extended (Version: 4.0.30319)
Microsoft Application Error Reporting (Version: 12.0.6012.5000)
Microsoft PowerPoint Viewer (Version: 14.0.6029.1000)
Microsoft SkyDrive (Version: 17.0.2015.0811)
Microsoft SQL Server 2005 Compact Edition [ENU] (Version: 3.1.0000)
Microsoft VC9 runtime libraries (Version: 2.0.0)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.56336)
Microsoft Visual C++ 2005 Redistributable (Version: 8.0.61001)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17 (Version: 9.0.30729)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148 (Version: 9.0.30729.4148)
Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (Version: 9.0.30729.6161)
Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (Version: 10.0.40219)
Microsoft Web Platform Installer 4.6 (Version: 4.0.40719.0)
Movie Maker (Version: 16.4.3508.0205)
Mozilla Firefox 23.0.1 (x86 en-US) (Version: 23.0.1)
Mozilla Maintenance Service (Version: 23.0.1)
MSVCRT (Version: 15.4.2862.0708)
MSVCRT Redists (Version: 1.0)
MSVCRT110 (Version: 16.4.1108.0727)
MSXML 4.0 SP2 (KB954430) (Version: 4.20.9870.0)
MSXML 4.0 SP2 (KB973688) (Version: 4.20.9876.0)
NiceCopier (Version: 13.07.18)
Notepad++ (Version: 5.9.3)
NVIDIA PhysX (Version: 9.09.0814)
OpenOffice.org 3.2 (Version: 3.2.9483)
Opera 12.16 (Version: 12.16.1860)
Palm Desktop by ACCESS (Version: 6.4.0.0)
PCSX2 - Playstation 2 Emulator
Photo Gallery (Version: 16.4.3508.0205)
Replay Media Catcher 4 (4.3.2) (Version: 4.3.2)
SendBlaster 2 (Version: 002.000.01312)
Shareaza 2.6.0.0 (Version: 2.6.0.0)
Skype™ 6.3 (Version: 6.3.105)
SoundMAX (Version: 5.12.1.7010)
Spybot - Search & Destroy (Version: 1.6.2)
TeamViewer 8 (Version: 8.0.18930)
TuneUp Companion 2.2.7 (Version: 2.2.7)
U2bviews Software (Version: 2.0.0)
Update for Microsoft .NET Framework 4 Client Profile (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2533523) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2600217) (Version: 1)
Update for Microsoft .NET Framework 4 Client Profile (KB2836939) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2468871) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2533523) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2600217) (Version: 1)
Update for Microsoft .NET Framework 4 Extended (KB2836939) (Version: 1)
Vegas Pro 11.0 (Version: 11.0.700)
VLC media player 1.0.1 (Version: 1.0.1)
Windows 7 Codec Pack 3.4.0 (Version: 3.4.0)
Windows 7 USB/DVD Download Tool (Version: 1.0.30)
Windows Live Communications Platform (Version: 16.4.3508.0205)
Windows Live Essentials (Version: 16.4.3508.0205)
Windows Live ID Sign-in Assistant (Version: 7.250.4311.0)
Windows Live Installer (Version: 16.4.3508.0205)
Windows Live Photo Common (Version: 16.4.3508.0205)
Windows Live PIMT Platform (Version: 16.4.3508.0205)
Windows Live SOXE (Version: 16.4.3508.0205)
Windows Live SOXE Definitions (Version: 16.4.3508.0205)
Windows Live UX Platform (Version: 16.4.3508.0205)
Windows Live UX Platform Language Pack (Version: 16.4.3508.0205)
Windows Live Writer (Version: 16.4.3508.0205)
Windows Live Writer Resources (Version: 16.4.3508.0205)
Windows Media Encoder 9 Series
Windows Media Encoder 9 Series (Version: 9.00.2980)
Windows XP Mode (Version: 1.3.7600.16423)
WinRAR 4.00 beta 7 (32-bit) (Version: 4.00.7)
Wondershare DVD Creator(Build 2.6.5)
Xilisoft Video Converter Ultimate (Version: 5.1.39.0409)
Xvid Video Codec (Version: 1.3.2)
Yahoo Browser Settings

========================= Devices: ================================


========================= Memory info: ===================================

Percentage of memory in use: 75%
Total physical RAM: 2038.14 MB
Available physical RAM: 489.39 MB
Total Pagefile: 4076.28 MB
Available Pagefile: 2426.7 MB
Total Virtual: 2047.88 MB
Available Virtual: 1933.64 MB

========================= Partitions: =====================================

1 Drive c: () (Fixed) (Total:74.41 GB) (Free:22.07 GB) NTFS
2 Drive d: () (Fixed) (Total:698.63 GB) (Free:428.11 GB) NTFS

========================= Users: ========================================

User accounts for \\KEIFER-PC

Administrator Guest keifer


**** End of log ****

 

 

MBAM Log (Pro Version):

 

Note:  After it finished and i restarted the "System Process" was at 50% so i had to restart again to make the computer usable.  After the 2nd restart explorer.exe was back at 50%.  All just like i started in the first post.

 

 

Malwarebytes Anti-Malware (PRO) 1.75.0.1300
www.malwarebytes.org

Database version: v2013.08.28.07

Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 9.0.8112.16421
keifer :: KEIFER-PC [administrator]

Protection: Disabled

8/30/2013 9:38:20 PM
mbam-log-2013-08-30 (21-38-20).txt

Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 215502
Time elapsed: 12 minute(s), 26 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 1
HKLM\SYSTEM\CurrentControlSet\Services\etadpug (Trojan.Zaccess) -> Delete on reboot.

Registry Values Detected: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|Google Update (Trojan.Zaccess) -> Data: -> Quarantined and deleted successfully.

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)

 

 

MBAR Logs:

 

Note:  I had to suspend explorer.exe in order for the scan to complete.

 

 

mbar-log-2013-08-30 (22-00-54).txt:

 

Malwarebytes Anti-Rootkit BETA 1.07.0.1005
www.malwarebytes.org

Database version: v2013.08.31.01

Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 9.0.8112.16421
keifer :: KEIFER-PC [administrator]

8/30/2013 10:00:54 PM
mbar-log-2013-08-30 (22-00-54).txt

Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled:
Objects scanned: 224546
Time elapsed: 12 minute(s), 52 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 1
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\etadpug (Trojan.Zaccess) -> No action taken.

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 14
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙ (Trojan.0Access) -> No action taken.
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨ (Trojan.0Access) -> No action taken.
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛ (Trojan.0Access) -> No action taken.
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d} (Trojan.0Access) -> No action taken.
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\L (Trojan.0Access) -> No action taken.
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\U (Trojan.0Access) -> No action taken.
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d} (Trojan.0Access) -> No action taken.
c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ (Trojan.0Access) -> No action taken.
c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \... (Trojan.0Access) -> No action taken.
c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛ (Trojan.0Access) -> No action taken.
c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d} (Trojan.0Access) -> No action taken.
c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\l (Trojan.0Access) -> No action taken.
c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\u (Trojan.0Access) -> No action taken.
C:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d} (Trojan.0Access) -> No action taken.

Files Detected: 4
C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\@ (Trojan.0Access) -> No action taken.
c:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\@ (Trojan.0Access) -> No action taken.
c:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\U\00000008.@ (Trojan.0Access) -> No action taken.
c:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\U\80000032.@ (Trojan.0Access) -> No action taken.

Physical Sectors Detected: 0
(No malicious items detected)

(end)

 

System-log.txt:

---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.07.0.1005

© Malwarebytes Corporation 2011-2012

OS version: 6.1.7601 Windows 7 Service Pack 1 x86

Account is Administrative

Internet Explorer version: 9.0.8112.16421

File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 3.192000 GHz
Memory total: 2137145344, free: 665346048

Downloaded database version: v2013.08.30.10
Downloaded database version: v2013.08.06.01
=======================================


---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.07.0.1005

© Malwarebytes Corporation 2011-2012

OS version: 6.1.7601 Windows 7 Service Pack 1 x86

Account is Administrative

Internet Explorer version: 9.0.8112.16421

File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 3.192000 GHz
Memory total: 2137145344, free: 1268056064

Downloaded database version: v2013.08.31.01
Downloaded database version: v2013.08.06.01
=======================================
Initializing...
------------ Kernel report ------------
08/30/2013 22:00:46
------------ Loaded modules -----------
\SystemRoot\system32\ntoskrnl.exe
\SystemRoot\system32\halmacpi.dll
\SystemRoot\system32\kdcom.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\BOOTVID.dll
\SystemRoot\system32\CLFS.SYS
\SystemRoot\system32\CI.dll
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\ACPI.sys
\SystemRoot\system32\drivers\WMILIB.SYS
\SystemRoot\system32\drivers\msisadrv.sys
\SystemRoot\system32\drivers\pci.sys
\SystemRoot\system32\drivers\vdrvroot.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\system32\drivers\intelide.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\system32\drivers\atapi.sys
\SystemRoot\system32\drivers\ataport.SYS
\SystemRoot\system32\drivers\amdxata.sys
\SystemRoot\system32\drivers\fltmgr.sys
\SystemRoot\system32\drivers\fileinfo.sys
\SystemRoot\System32\Drivers\Ntfs.sys
\SystemRoot\System32\Drivers\msrpc.sys
\SystemRoot\System32\Drivers\ksecdd.sys
\SystemRoot\System32\Drivers\cng.sys
\SystemRoot\System32\drivers\pcw.sys
\SystemRoot\System32\Drivers\Fs_Rec.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\Drivers\ksecpkg.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\drivers\vmstorfl.sys
\SystemRoot\system32\drivers\volsnap.sys
\SystemRoot\System32\Drivers\spldr.sys
\SystemRoot\System32\drivers\rdyboost.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\System32\drivers\hwpolicy.sys
\SystemRoot\System32\DRIVERS\fvevol.sys
\SystemRoot\system32\drivers\disk.sys
\SystemRoot\system32\drivers\CLASSPNP.SYS
\SystemRoot\system32\DRIVERS\avgrkx86.sys
\SystemRoot\system32\DRIVERS\avglogx.sys
\SystemRoot\system32\DRIVERS\avgmfx86.sys
\SystemRoot\system32\DRIVERS\avgidshx.sys
\SystemRoot\system32\DRIVERS\cdrom.sys
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\vga.sys
\SystemRoot\System32\drivers\VIDEOPRT.SYS
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\System32\DRIVERS\RDPCDD.sys
\SystemRoot\system32\drivers\rdpencdd.sys
\SystemRoot\system32\drivers\rdprefmp.sys
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\system32\DRIVERS\avgfwd6x.sys
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\system32\DRIVERS\avgtdix.sys
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\system32\DRIVERS\wfplwf.sys
\SystemRoot\system32\DRIVERS\pacer.sys
\SystemRoot\system32\DRIVERS\vpcnfltr.sys
\SystemRoot\system32\DRIVERS\netbios.sys
\SystemRoot\system32\DRIVERS\serial.sys
\SystemRoot\system32\DRIVERS\wanarp.sys
\SystemRoot\system32\drivers\vpcvmm.sys
\SystemRoot\system32\DRIVERS\termdd.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\system32\DRIVERS\mssmbios.sys
\SystemRoot\System32\Drivers\ElbyCDIO.sys
\SystemRoot\System32\drivers\discache.sys
\SystemRoot\system32\drivers\csc.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\blbdrive.sys
\SystemRoot\system32\DRIVERS\avgldx86.sys
\SystemRoot\system32\DRIVERS\avgidsshimx.sys
\SystemRoot\system32\DRIVERS\avgidsdriverx.sys
\SystemRoot\system32\DRIVERS\tunnel.sys
\SystemRoot\system32\DRIVERS\intelppm.sys
\SystemRoot\system32\DRIVERS\igdkmd32.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\dxgmms1.sys
\SystemRoot\system32\DRIVERS\b57nd60x.sys
\SystemRoot\system32\DRIVERS\usbuhci.sys
\SystemRoot\system32\DRIVERS\USBPORT.SYS
\SystemRoot\system32\DRIVERS\usbehci.sys
\SystemRoot\system32\drivers\smwdm.sys
\SystemRoot\system32\drivers\portcls.sys
\SystemRoot\system32\drivers\drmk.sys
\SystemRoot\system32\drivers\ks.sys
\SystemRoot\system32\DRIVERS\parport.sys
\SystemRoot\system32\DRIVERS\serenum.sys
\SystemRoot\System32\Drivers\AnyDVD.sys
\SystemRoot\system32\DRIVERS\GEARAspiWDM.sys
\SystemRoot\system32\DRIVERS\CompositeBus.sys
\SystemRoot\system32\DRIVERS\AgileVpn.sys
\SystemRoot\system32\DRIVERS\rasl2tp.sys
\SystemRoot\system32\DRIVERS\ndistapi.sys
\SystemRoot\system32\DRIVERS\ndiswan.sys
\SystemRoot\system32\DRIVERS\raspppoe.sys
\SystemRoot\system32\DRIVERS\raspptp.sys
\SystemRoot\system32\DRIVERS\rassstp.sys
\SystemRoot\system32\DRIVERS\appliand.sys
\SystemRoot\system32\DRIVERS\rdpbus.sys
\SystemRoot\system32\DRIVERS\kbdclass.sys
\SystemRoot\system32\DRIVERS\mouclass.sys
\SystemRoot\system32\DRIVERS\swenum.sys
\SystemRoot\system32\DRIVERS\umbus.sys
\SystemRoot\system32\DRIVERS\vpcusb.sys
\SystemRoot\system32\DRIVERS\usbrpm.sys
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\system32\DRIVERS\vpchbus.sys
\SystemRoot\system32\DRIVERS\usbhub.sys
\SystemRoot\System32\Drivers\NDProxy.SYS
\SystemRoot\system32\DRIVERS\usbccgp.sys
\SystemRoot\system32\DRIVERS\hidusb.sys
\SystemRoot\system32\DRIVERS\HIDCLASS.SYS
\SystemRoot\system32\DRIVERS\HIDPARSE.SYS
\SystemRoot\system32\DRIVERS\kbdhid.sys
\SystemRoot\system32\DRIVERS\mouhid.sys
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\Drivers\dump_dumpata.sys
\SystemRoot\System32\Drivers\dump_atapi.sys
\SystemRoot\System32\Drivers\dump_dumpfve.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\Dxapi.sys
\SystemRoot\system32\DRIVERS\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\System32\ATMFD.DLL
\SystemRoot\system32\drivers\luafv.sys
\??\C:\Windows\system32\drivers\mbam.sys
\SystemRoot\system32\DRIVERS\lltdio.sys
\SystemRoot\system32\DRIVERS\rspndr.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\system32\DRIVERS\parvdm.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\Drivers\secdrv.SYS
\SystemRoot\System32\drivers\tcpipreg.sys
\??\C:\Windows\system32\Drivers\PROCEXP141.SYS
\??\C:\Windows\system32\drivers\mbamchameleon.sys
\??\C:\Windows\system32\drivers\MBAMSwissArmy.sys
\Windows\System32\ntdll.dll
\Windows\System32\smss.exe
\Windows\System32\apisetschema.dll
----------- End -----------
Done!
<<<1>>>
Upper Device Name: \Device\Harddisk1\DR1
Upper Device Object: 0xffffffff85621030
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IdeDeviceP1T1L0-2\
Lower Device Object: 0xffffffff8514d610
Lower Device Driver Name: \Driver\atapi\
<<<1>>>
Upper Device Name: \Device\Harddisk0\DR0
Upper Device Object: 0xffffffff85620a38
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IdeDeviceP1T0L0-1\
Lower Device Object: 0xffffffff8514c908
Lower Device Driver Name: \Driver\atapi\
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffffff85620a38, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff85620670, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffffff85620a38, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
DevicePointer: 0xffffffff8514c908, DeviceName: \Device\Ide\IdeDeviceP1T0L0-1\, DriverName: \Driver\atapi\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Done!
Drive 0
Scanning MBR on drive 0...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 374AB7F2

Partition information:

Partition 0 type is Primary (0x7)
Partition is ACTIVE.
Partition starts at LBA: 2048 Numsec = 204800
Partition file system is NTFS
Partition is bootable

Partition 1 type is Primary (0x7)
Partition is NOT ACTIVE.
Partition starts at LBA: 206848 Numsec = 156039168

Partition 2 type is Empty (0x0)
Partition is NOT ACTIVE.
Partition starts at LBA: 0 Numsec = 0

Partition 3 type is Empty (0x0)
Partition is NOT ACTIVE.
Partition starts at LBA: 0 Numsec = 0

Disk Size: 80000000000 bytes
Sector size: 512 bytes

Scanning physical sectors of unpartitioned space on drive 0 (1-2047-156230000-156250000)...
Done!
Physical Sector Size: 512
Drive: 1, DevicePointer: 0xffffffff85621030, DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff856200b0, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffffff85621030, DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\Disk\
DevicePointer: 0xffffffff8514d610, DeviceName: \Device\Ide\IdeDeviceP1T1L0-2\, DriverName: \Driver\atapi\
------------ End ----------
Alternate DeviceName: \Device\Harddisk1\DR1\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
Drive 1
Scanning MBR on drive 1...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 7C385AE7

Partition information:

Partition 0 type is Primary (0x7)
Partition is ACTIVE.
Partition starts at LBA: 2048 Numsec = 1465143296
Partition file system is NTFS
Partition is bootable

Partition 1 type is Empty (0x0)
Partition is NOT ACTIVE.
Partition starts at LBA: 0 Numsec = 0

Partition 2 type is Empty (0x0)
Partition is NOT ACTIVE.
Partition starts at LBA: 0 Numsec = 0

Partition 3 type is Empty (0x0)
Partition is NOT ACTIVE.
Partition starts at LBA: 0 Numsec = 0

Disk Size: 750156374016 bytes
Sector size: 512 bytes

Done!
Read File: File "c:\programdata\avg2013\chjw\4a34b60c34b5fb51.dat:04267e63-8317-420e-9acd-ea2c6ff40f6e" is sparse (flags = 32768)
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\etadpug --> [Trojan.Zaccess]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙ --> [Trojan.0Access]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨ --> [Trojan.0Access]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛ --> [Trojan.0Access]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d} --> [Trojan.0Access]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\@ --> [Trojan.0Access]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\L --> [Trojan.0Access]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\U --> [Trojan.0Access]
Infected: C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d} --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \... --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d} --> [Trojan.0Access]
Infected: c:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\@ --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\l --> [Trojan.0Access]
Infected: c:\program files\google\desktop\install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\u --> [Trojan.0Access]
Infected: c:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\U\00000008.@ --> [Trojan.0Access]
Infected: c:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\U\80000032.@ --> [Trojan.0Access]
Infected: C:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d} --> [Trojan.0Access]
Scan finished

 

 

Rkill Log:

 

 

Rkill 2.6.1 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2013 BleepingComputer.com
More Information about Rkill can be found at this link:
http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 08/30/2013 10:15:42 PM in x86 mode.
Windows Version: Windows 7 Ultimate Service Pack 1

Checking for Windows services to stop:

* No malware services found to stop.

Checking for processes to terminate:

* No malware processes found to kill.

Checking Registry for malware related settings:

* taskmgr.exe debugger. [IFEO Debugger Deleted]

Backup Registry file created at:
C:\Users\keifer\Desktop\rkill\rkill-08-30-2013-10-15-46.reg

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

* Windows Defender Disabled

[HKLM\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware" = dword:00000001

* ALERT: ZEROACCESS rootkit symptoms found!

* C:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ [ZA Dir]
* C:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \ [ZA Dir]
* C:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ [ZA Dir]
* C:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\ [ZA Dir]
* C:\Program Files\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ \...\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\ [ZA Dir]
* C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\ [ZA Dir]
* C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\ [ZA Dir]
* C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ [ZA Dir]
* C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\ [ZA Dir]
* C:\Users\keifer\AppData\Local\Google\Desktop\Install\{6f9e7561-67f6-5188-d006-a52020677b7d}\❤≸⋙\Ⱒ☠⍨\ﯹ๛\{6f9e7561-67f6-5188-d006-a52020677b7d}\ [ZA Dir]

 



#4 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:09:13 PM

Posted 30 August 2013 - 11:23 PM

You're infected with the latest version of ZeroAccess rootkit.

It'll require elevated help.

 

Please follow the instructions in THIS GUIDE starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it HERE. Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#5 keiferhelms

keiferhelms
  • Topic Starter

  • Members
  • 14 posts
  • OFFLINE
  •  
  • Local time:10:13 PM

Posted 31 August 2013 - 12:22 PM

I have posted the new topic as requested with the DDS logs Here.

 

 

http://www.bleepingcomputer.com/forums/t/506258/explorerexe-high-cpu-and-fake-movie-files-in-media-tools-folder/

 



#6 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,663 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:09:13 PM

Posted 31 August 2013 - 01:03 PM

thumbsup-thumbs-up-approve-ok-smiley-emo


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users