Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

ICE Virus: I can't access ANY safe mode


  • This topic is locked This topic is locked
9 replies to this topic

#1 sippingit

sippingit

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:09 PM

Posted 02 October 2013 - 12:44 PM

Need Help:

I have a Toshiba Satellite, with windows Vista. The virus came up today and takes the whole screen. I tried to reboot in safe mode (regular, Command Prompt or Networking) but each time the safe mode start, it shuts off and restart in regular mode.

I tried to restore the computer in a previous date but it doesn't allow me. I have downloaded Hitman Pro into a flash drive but I'm not able to use it as NO command screen ever came on. 

I'm not computer savvy so please help



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:09 PM

Posted 02 October 2013 - 01:10 PM


Hello sippingit

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

For x32 (x86) bit systems download Farbar Recovery Scan Tool and save it to a flash drive.

For x64 bit systems download Farbar Recovery Scan Tool x64 and save it to a flash drive.

How to tell > 32 or 64 bit

Plug the flashdrive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:

    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt
  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst64.exe or e:\frst.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • First Press the Scan button.
  • It will make a log (FRST.txt)
I want you to poste the FRST.txt report into your reply to me

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 sippingit

sippingit
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:09 PM

Posted 02 October 2013 - 01:46 PM

Thank for the Help Gringo.

 

Let me know what's my next step:

 

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 03-10-2013
Ran by SYSTEM on MININT-C7DFODO on 02-10-2013 14:34:40
Running from F:\
Windows 7 Home Premium (X86) OS Language: English(US)
Internet Explorer Version 9
Boot Mode: Recovery
 
The current controlset is ControlSet001
ATTENTION!:=====> If the system is bootable FRST could be run from normal or Safe mode to create a complete log.
 
==================== Registry (Whitelisted) ==================
 
HKLM\...\Run: [] - [x]
HKLM\...\Run: [RtHDVCpl] - C:\Program Files\Realtek\Audio\HDA\RtHDVCpl.exe [7625248 2009-07-28] (Realtek Semiconductor)
HKLM\...\Run: [TPwrMain] - C:\Program Files\TOSHIBA\Power Saver\TPwrMain.EXE [476512 2009-08-05] (TOSHIBA Corporation)
HKLM\...\Run: [AppleSyncNotifier] - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleSyncNotifier.exe [59240 2011-10-05] (Apple Inc.)
HKLM\...\Run: [QuickTime Task] - C:\Program Files\QuickTime\QTTask.exe [421888 2011-07-05] (Apple Inc.)
HKLM\...\Run: [APSDaemon] - C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe [59720 2013-04-21] (Apple Inc.)
HKLM\...\Run: [Adobe Reader Speed Launcher] - C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe [41208 2012-12-19] (Adobe Systems Incorporated)
HKLM\...\Run: [Adobe ARM] - C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [946352 2012-12-02] (Adobe Systems Incorporated)
HKLM\...\Run: [iTunesHelper] - C:\Program Files\iTunes\iTunesHelper.exe [152392 2013-09-17] (Apple Inc.)
HKLM\...\RunOnce: [*Restore] - C:\windows\system32\rstrui.exe /RUNONCE [262656 2010-11-20] (Microsoft Corporation)
HKU\Owner\...\Run: [swg] - C:\Program Files\Google\GoogleToolbarNotifier\GoogleToolbarNotifier.exe [ 2012-06-15] (Google Inc.)
HKU\Owner\...\Run: [Skype] - C:\Program Files\Skype\Phone\Skype.exe [ 2013-06-21] (Skype Technologies S.A.)
HKU\Owner\...\Run: [HP Officejet 6600 (NET)] - C:\Program Files\HP\HP Officejet 6600\Bin\ScanToPCActivationApp.exe [ 2011-09-09] (Hewlett-Packard Co.)
HKU\Owner\...\Run: [qcgce2mrvjq91kk1e7pnbb19m52fx] - C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe [ 2013-10-02] (ValveCorporation) <===== ATTENTION
HKU\Owner\...\Winlogon: [Shell] cmd.exe [ 2010-11-20] (Microsoft Corporation) <==== ATTENTION 
HKU\Owner\...\Command Processor: "C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe" <===== ATTENTION!
 
========================== Services (Whitelisted) =================
 
S2 cfWiMAXService; C:\Program Files\TOSHIBA\ConfigFree\CFIWmxSvcs.exe [185712 2009-08-10] (TOSHIBA CORPORATION)
S2 ConfigFree Service; C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe [46448 2009-03-10] (TOSHIBA CORPORATION)
S2 FlipShare Service; C:\Program Files\Flip Video\FlipShare\FlipShareService.exe [460144 2011-05-06] ()
S2 FlipShareServer; C:\Program Files\Flip Video\FlipShareServer\FlipShareServer.exe [1085440 2011-05-06] ()
S3 GameConsoleService; C:\Program Files\TOSHIBA Games\TOSHIBA Game Console\GameConsoleService.exe [250616 2009-05-22] (WildTangent, Inc.)
S2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
S2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
S3 McComponentHostService; C:\Program Files\McAfee Security Scan\3.0.318\McCHSvc.exe [235216 2013-02-05] (McAfee, Inc.)
S2 nmservice; C:\Program Files\Common Files\Pure Networks Shared\Platform\nmsrvc.exe [642856 2008-12-12] (Cisco Systems, Inc.)
S2 Norton Internet Security; C:\Program Files\Norton Internet Security\Engine\16.8.3.6\diMaster.dll [135024 2011-10-12] (Symantec Corporation)
S3 TMachInfo; C:\Program Files\TOSHIBA\TOSHIBA Service Station\TMachInfo.exe [54136 2011-02-11] (TOSHIBA Corporation)
S2 TOSHIBA eco Utility Service; C:\Program Files\TOSHIBA\TECO\TecoService.exe [185712 2009-08-11] (TOSHIBA Corporation)
S3 TOSHIBA HDD SSD Alert Service; C:\Program Files\TOSHIBA\TOSHIBA HDD SSD Alert\TosSmartSrv.exe [111960 2009-09-17] (TOSHIBA Corporation)
S3 TPCHSrv; C:\Program Files\TOSHIBA\TPHM\TPCHSrv.exe [685424 2009-08-06] (TOSHIBA Corporation)
S2 LinksysUpdater; "C:\Program Files\Linksys\Linksys Updater\bin\LinksysUpdater.exe" -s "C:\Program Files\Linksys\Linksys Updater\conf\wrapper.conf"
 
==================== Drivers (Whitelisted) ====================
 
S1 BHDrvx86; C:\Windows\System32\Drivers\NIS\1008030.006\BHDrvx86.sys [259632 2009-08-21] (Symantec Corporation)
S1 ccHP; C:\Windows\System32\Drivers\NIS\1008030.006\ccHPx86.sys [467592 2011-10-12] (Symantec Corporation)
S0 CLFS; C:\Windows\System32\CLFS.sys [249408 2009-07-13] (Microsoft Corporation)
S1 eeCtrl; C:\Program Files\Common Files\Symantec Shared\EENGINE\eeCtrl.sys [374392 2012-02-04] (Symantec Corporation)
S3 hitmanpro37; C:\windows\system32\drivers\hitmanpro37.sys [30976 2013-09-01] ()
S1 IDSVix86; C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\ipsdefs\20091217.002\IDSvix86.sys [343088 2009-10-28] (Symantec Corporation)
S3 MBAMProtector; C:\windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation)
S3 NAVENG; C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20091227.023\NAVENG.SYS [84912 2009-11-27] (Symantec Corporation)
S3 NAVEX15; C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\Norton\Definitions\VirusDefs\20091227.023\NAVEX15.SYS [1323568 2009-11-27] (Symantec Corporation)
S3 PGEffect; C:\Windows\System32\DRIVERS\pgeffect.sys [24064 2009-06-22] (TOSHIBA Corporation)
S2 pnarp; C:\Windows\System32\DRIVERS\pnarp.sys [24880 2008-12-12] (Cisco Systems, Inc.)
S2 purendis; C:\Windows\System32\DRIVERS\purendis.sys [26416 2008-12-12] (Cisco Systems, Inc.)
S3 SRTSP; C:\Windows\System32\Drivers\NIS\1008030.006\SRTSP.SYS [308272 2009-08-21] (Symantec Corporation)
S1 SRTSPX; C:\Windows\system32\drivers\NIS\1008030.006\SRTSPX.SYS [43696 2009-08-21] (Symantec Corporation)
S0 SymEFA; C:\Windows\System32\drivers\NIS\1008030.006\SYMEFA.SYS [310320 2009-08-21] (Symantec Corporation)
S3 SymEvent; C:\windows\system32\Drivers\SYMEVENT.SYS [124976 2009-11-27] (Symantec Corporation)
S1 SymIM; C:\Windows\System32\DRIVERS\SymIMv.sys [25648 2009-08-21] (Symantec Corporation)
S1 SYMTDI; C:\Windows\System32\Drivers\NIS\1008030.006\SYMTDI.SYS [217464 2011-09-21] (Symantec Corporation)
S2 TVALZFL; C:\Windows\System32\DRIVERS\TVALZFL.sys [12920 2009-06-19] (TOSHIBA Corporation)
S3 rootrepeal; \??\C:\windows\system32\drivers\rootrepeal.sys [x]
S3 RtsUIR; system32\DRIVERS\Rts516xIR.sys [x]
S3 SYMFW; \SystemRoot\System32\Drivers\NIS\1007020.00B\SYMFW.SYS [x]
S3 SYMNDISV; \SystemRoot\System32\Drivers\NIS\1007020.00B\SYMNDISV.SYS [x]
S3 USBCCID; system32\DRIVERS\RtsUCcid.sys [x]
 
==================== NetSvcs (Whitelisted) ===================
 
 
==================== One Month Created Files and Folders ========
 
2013-10-02 14:34 - 2013-10-02 14:34 - 00000000 ____D C:\FRST
2013-10-02 07:17 - 2013-10-02 07:17 - 02019347 _____ C:\Users\Owner\AppData\Local\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019317 _____ C:\ProgramData\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019264 _____ C:\Users\Owner\AppData\Roaming\2433f433
2013-09-25 21:10 - 2013-09-25 21:10 - 00001764 _____ C:\Users\Public\Desktop\iTunes.lnk
2013-09-25 21:09 - 2013-09-25 21:10 - 00000000 ____D C:\ProgramData\188F1432-103A-4ffb-80F1-36B633C5C9E1
2013-09-25 21:09 - 2013-09-25 21:10 - 00000000 ____D C:\Program Files\iTunes
2013-09-25 21:09 - 2013-09-25 21:09 - 00000000 ____D C:\Program Files\iPod
2013-09-21 15:45 - 2013-09-21 15:45 - 00000000 ____D C:\Users\Owner\AppData\Local\{7EBD3792-D300-4BA2-A1F0-968DE092034C}
2013-09-18 19:38 - 2013-09-18 19:38 - 00023552 ___SH C:\Users\Owner\Thumbs.db
2013-09-18 19:26 - 2013-09-19 04:35 - 00084992 _____ C:\Users\Owner\Desktop\Opening Cost - Columbia.xls
2013-09-18 16:47 - 2013-09-18 16:47 - 00000000 ____D C:\ProgramData\Yahoo! Companion
2013-09-13 17:03 - 2013-07-31 01:52 - 01129472 _____ (Microsoft Corporation) C:\Windows\System32\wininet.dll
2013-09-13 17:03 - 2013-07-31 01:49 - 00065024 _____ (Microsoft Corporation) C:\Windows\System32\jsproxy.dll
2013-09-13 17:03 - 2013-07-31 01:48 - 00420864 _____ (Microsoft Corporation) C:\Windows\System32\vbscript.dll
2013-09-13 17:03 - 2013-07-31 01:48 - 00142848 _____ (Microsoft Corporation) C:\Windows\System32\ieUnatt.exe
2013-09-13 17:03 - 2013-07-31 01:47 - 00607744 _____ (Microsoft Corporation) C:\Windows\System32\msfeeds.dll
2013-09-13 17:03 - 2013-07-31 01:45 - 02382848 _____ (Microsoft Corporation) C:\Windows\System32\mshtml.tlb
2013-09-13 17:03 - 2013-07-31 01:45 - 00073216 _____ (Microsoft Corporation) C:\Windows\System32\mshtmled.dll
2013-09-13 17:03 - 2013-07-31 01:42 - 00176640 _____ (Microsoft Corporation) C:\Windows\System32\ieui.dll
2013-09-13 17:02 - 2013-07-31 02:30 - 12335104 _____ (Microsoft Corporation) C:\Windows\System32\mshtml.dll
2013-09-13 17:02 - 2013-07-31 02:05 - 09738752 _____ (Microsoft Corporation) C:\Windows\System32\ieframe.dll
2013-09-13 17:02 - 2013-07-31 02:00 - 01800704 _____ (Microsoft Corporation) C:\Windows\System32\jscript9.dll
2013-09-13 17:02 - 2013-07-31 01:53 - 01104896 _____ (Microsoft Corporation) C:\Windows\System32\urlmon.dll
2013-09-13 17:02 - 2013-07-31 01:52 - 01427968 _____ (Microsoft Corporation) C:\Windows\System32\inetcpl.cpl
2013-09-13 17:02 - 2013-07-31 01:51 - 00231936 _____ (Microsoft Corporation) C:\Windows\System32\url.dll
2013-09-13 17:02 - 2013-07-31 01:48 - 00717824 _____ (Microsoft Corporation) C:\Windows\System32\jscript.dll
2013-09-13 17:02 - 2013-07-31 01:46 - 01796096 _____ (Microsoft Corporation) C:\Windows\System32\iertutil.dll
2013-09-12 05:58 - 2013-08-07 17:03 - 02348544 _____ (Microsoft Corporation) C:\Windows\System32\win32k.sys
2013-09-12 05:58 - 2013-08-04 17:56 - 00133056 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\ataport.sys
2013-09-12 05:58 - 2013-08-01 17:50 - 00169984 _____ (Microsoft Corporation) C:\Windows\System32\winsrv.dll
2013-09-12 05:58 - 2013-08-01 17:49 - 00868352 _____ (Microsoft Corporation) C:\Windows\System32\kernel32.dll
2013-09-12 05:58 - 2013-08-01 17:49 - 00293376 _____ (Microsoft Corporation) C:\Windows\System32\KernelBase.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00005120 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-file-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00004608 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-processthreads-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00004096 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-sysinfo-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00004096 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-synch-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00004096 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-misc-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00004096 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-localregistry-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00004096 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-localization-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003584 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-processenvironment-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003584 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-namedpipe-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003584 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-memory-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003584 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-libraryloader-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003584 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-interlocked-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003584 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-heap-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-string-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-rtlsupport-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-profile-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-io-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-handle-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-fibers-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-errorhandling-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-delayload-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-debug-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-datetime-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 17:48 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-console-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 16:52 - 00271360 _____ (Microsoft Corporation) C:\Windows\System32\conhost.exe
2013-09-12 05:58 - 2013-08-01 16:43 - 00006144 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-security-base-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 16:43 - 00004608 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-threadpool-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 16:43 - 00003584 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-xstate-l1-1-0.dll
2013-09-12 05:58 - 2013-08-01 16:43 - 00003072 ____H (Microsoft Corporation) C:\Windows\System32\api-ms-win-core-util-l1-1-0.dll
2013-09-12 05:58 - 2013-07-25 17:55 - 12872704 _____ (Microsoft Corporation) C:\Windows\System32\shell32.dll
2013-09-12 05:58 - 2013-07-25 17:55 - 00180224 _____ (Microsoft Corporation) C:\Windows\System32\shdocvw.dll
2013-09-02 05:27 - 2012-12-16 06:13 - 00295424 _____ (Adobe Systems Incorporated) C:\Windows\System32\atmfd.dll
2013-09-02 05:27 - 2012-12-16 06:13 - 00034304 _____ (Adobe Systems) C:\Windows\System32\atmlib.dll
 
==================== One Month Modified Files and Folders =======
 
2013-10-02 14:34 - 2013-10-02 14:34 - 00000000 ____D C:\FRST
2013-10-02 13:17 - 2009-11-24 05:13 - 00000000 ____D C:\users\Owner
2013-10-02 13:17 - 2009-07-13 18:37 - 00000000 ____D C:\Windows\System32\wfp
2013-10-02 11:54 - 2011-10-19 05:48 - 00000000 ____D C:\ProgramData\McAfee Security Scan
2013-10-02 09:05 - 2009-07-13 20:39 - 00091296 _____ C:\Windows\setupact.log
2013-10-02 09:00 - 2009-10-26 06:57 - 01740734 _____ C:\Windows\WindowsUpdate.log
2013-10-02 08:55 - 2009-09-03 17:31 - 00077516 _____ C:\Windows\PFRO.log
2013-10-02 07:17 - 2013-10-02 07:17 - 02019347 _____ C:\Users\Owner\AppData\Local\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019317 _____ C:\ProgramData\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019264 _____ C:\Users\Owner\AppData\Roaming\2433f433
2013-10-02 06:33 - 2010-08-11 09:06 - 00000000 ____D C:\Users\Owner\AppData\Roaming\Skype
2013-10-02 05:17 - 2013-04-29 23:01 - 00630857 _____ C:\Windows\IE10_main.log
2013-09-29 06:59 - 2009-07-13 20:34 - 00015792 _____ C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-09-29 06:59 - 2009-07-13 20:34 - 00015792 _____ C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-09-28 06:46 - 2012-02-25 10:40 - 00167424 ___SH C:\Users\Owner\Documents\Thumbs.db
2013-09-25 21:10 - 2013-09-25 21:10 - 00001764 _____ C:\Users\Public\Desktop\iTunes.lnk
2013-09-25 21:10 - 2013-09-25 21:09 - 00000000 ____D C:\ProgramData\188F1432-103A-4ffb-80F1-36B633C5C9E1
2013-09-25 21:10 - 2013-09-25 21:09 - 00000000 ____D C:\Program Files\iTunes
2013-09-25 21:09 - 2013-09-25 21:09 - 00000000 ____D C:\Program Files\iPod
2013-09-25 21:09 - 2009-11-27 08:09 - 00000000 ____D C:\Program Files\Common Files\Apple
2013-09-25 11:10 - 2009-07-13 18:37 - 00000000 ____D C:\Windows\rescache
2013-09-22 09:49 - 2011-06-14 14:55 - 00060416 _____ C:\Users\Owner\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2013-09-21 15:45 - 2013-09-21 15:45 - 00000000 ____D C:\Users\Owner\AppData\Local\{7EBD3792-D300-4BA2-A1F0-968DE092034C}
2013-09-19 14:35 - 2009-09-03 17:09 - 00726444 _____ C:\Windows\System32\PerfStringBackup.INI
2013-09-19 14:32 - 2012-03-29 14:30 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerApp.exe
2013-09-19 14:32 - 2011-05-16 09:19 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\System32\FlashPlayerCPLApp.cpl
2013-09-19 04:38 - 2009-11-27 02:40 - 00000000 ____D C:\Users\Owner\Desktop\Business Plan
2013-09-19 04:35 - 2013-09-18 19:26 - 00084992 _____ C:\Users\Owner\Desktop\Opening Cost - Columbia.xls
2013-09-18 19:38 - 2013-09-18 19:38 - 00023552 ___SH C:\Users\Owner\Thumbs.db
2013-09-18 16:47 - 2013-09-18 16:47 - 00000000 ____D C:\ProgramData\Yahoo! Companion
2013-09-18 16:47 - 2009-12-04 04:50 - 00000000 ____D C:\Program Files\Yahoo!
2013-09-18 16:47 - 2009-09-03 17:12 - 00000000 ____D C:\Windows\msdownld.tmp
2013-09-16 13:08 - 2009-07-13 18:37 - 00000000 ____D C:\Windows\Microsoft.NET
2013-09-15 09:32 - 2009-07-13 20:33 - 00416056 _____ C:\Windows\System32\FNTCACHE.DAT
2013-09-13 17:08 - 2009-07-13 18:04 - 00000499 _____ C:\Windows\win.ini
2013-09-13 17:00 - 2013-07-26 23:17 - 00000000 ____D C:\Windows\System32\MRT
2013-09-13 16:53 - 2009-11-24 05:25 - 76725432 _____ (Microsoft Corporation) C:\Windows\System32\MRT.exe
2013-09-02 14:38 - 2009-07-13 23:49 - 00000000 ____D C:\Program Files\Windows Journal
2013-09-02 14:38 - 2009-07-13 20:52 - 00000000 ____D C:\Program Files\Windows Defender
 
Files to move or delete:
====================
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe
 
 
Some content of TEMP:
====================
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.dll
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe
C:\Users\Owner\AppData\Local\Temp\ccsetup.exe
C:\Users\Owner\AppData\Local\Temp\contentDATs.exe
C:\Users\Owner\AppData\Local\Temp\GoogleToolbarInstaller_en32_signed.exe
C:\Users\Owner\AppData\Local\Temp\install_flashplayer11x32ax_gtba_aih.exe
C:\Users\Owner\AppData\Local\Temp\install_flash_player_ax_32bit.exe
C:\Users\Owner\AppData\Local\Temp\jre-7u13-windows-i586-iftw.exe
C:\Users\Owner\AppData\Local\Temp\jre-7u5-windows-i586-iftw.exe
C:\Users\Owner\AppData\Local\Temp\SecurityScan_Release.exe
C:\Users\Owner\AppData\Local\Temp\SkypeSetup.exe
 
 
==================== Known DLLs (Whitelisted) ============
 
 
==================== Bamital & volsnap Check =================
 
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
 
==================== EXE ASSOCIATION =====================
 
HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK
 
==================== Restore Points  =========================
 
6
Restore point made on: 2013-09-25 23:00:36
Restore point made on: 2013-09-27 07:33:02
Restore point made on: 2013-09-27 23:00:50
Restore point made on: 2013-09-28 23:00:55
Restore point made on: 2013-09-29 23:00:42
Restore point made on: 2013-10-02 05:15:21
 
==================== Memory info =========================== 
 
Percentage of memory in use: 15%
Total physical RAM: 2939.99 MB
Available physical RAM: 2469.84 MB
Total Pagefile: 2938.27 MB
Available Pagefile: 2501.17 MB
Total Virtual: 2047.88 MB
Available Virtual: 1957.91 MB
 
==================== Drives ================================
 
Drive c: (TI102805W0E) (Fixed) (Total:223.42 GB) (Free:14 GB) NTFS ==>[System with boot components (obtained from reading drive)]
Drive d: (System) (Fixed) (Total:1.46 GB) (Free:1.28 GB) NTFS ==>[System with boot components (obtained from reading drive)]
Drive f: () (Removable) (Total:0.06 GB) (Free:0.02 GB) FAT
Drive g: (TSB USB DRV) (Removable) (Total:1.92 GB) (Free:1.28 GB) FAT
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
 
==================== MBR & Partition Table ==================
 
========================================================
Disk: 0 (MBR Code: Windows 7 or Vista) (Size: 233 GB) (Disk ID: 1902C2AF)
Partition 1: (Active) - (Size=1 GB) - (Type=27)
Partition 2: (Not Active) - (Size=223 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=8 GB) - (Type=17)
 
========================================================
Disk: 1 (Size: 64 MB) (Disk ID: 00000000)
Partition 1: (Not Active) - (Size=64 MB) - (Type=04)
 
========================================================
Disk: 2 (Size: 2 GB) (Disk ID: 00000000)
Partition 1: (Not Active) - (Size=2 GB) - (Type=0E)
 
 
LastRegBack: 2013-10-02 12:54
 
==================== End Of Log ============================


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:09 PM

Posted 02 October 2013 - 02:34 PM



Hello sippingit



Open notepad. Please copy the contents of the code box below. To do this highlight the contents of the box and right click on it. Paste this into the open notepad. Save it on the flash drive as fixlist.txt

 
HKU\Owner\...\Run: [qcgce2mrvjq91kk1e7pnbb19m52fx] - C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe [ 2013-10-02] (ValveCorporation) <===== ATTENTION
HKU\Owner\...\Winlogon: [Shell] cmd.exe [ 2010-11-20] (Microsoft Corporation) <==== ATTENTION
HKU\Owner\...\Command Processor: "C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe" <===== ATTENTION!
2013-10-02 07:17 - 2013-10-02 07:17 - 02019347 _____ C:\Users\Owner\AppData\Local\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019317 _____ C:\ProgramData\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019264 _____ C:\Users\Owner\AppData\Roaming\2433f433
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.dll
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe
C:\Users\Owner\AppData\Local\Temp\ccsetup.exe
C:\Users\Owner\AppData\Local\Temp\contentDATs.exe
C:\Users\Owner\AppData\Local\Temp\GoogleToolbarInstaller_en32_signed.exe
C:\Users\Owner\AppData\Local\Temp\install_flashplayer11x32ax_gtba_aih.exe
C:\Users\Owner\AppData\Local\Temp\install_flash_player_ax_32bit.exe
C:\Users\Owner\AppData\Local\Temp\jre-7u13-windows-i586-iftw.exe
C:\Users\Owner\AppData\Local\Temp\jre-7u5-windows-i586-iftw.exe
C:\Users\Owner\AppData\Local\Temp\SecurityScan_Release.exe
C:\Users\Owner\AppData\Local\Temp\SkypeSetup.exe
NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options.

Run FRST again like we did before but this time press the Fix button just once and wait.
The tool will make a log on the flash drive (Fixlog.txt) please post it to your reply.

Also boot the computer into normal mode and let me know how things are looking.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 sippingit

sippingit
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:09 PM

Posted 02 October 2013 - 02:48 PM

Hi Gringo,

 

I was able to get the windows started again.

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 03-10-2013
Ran by SYSTEM at 2013-10-02 15:38:18 Run:1
Running from F:\
Boot Mode: Recovery
 
==============================================
 
Content of fixlist:
*****************
HKU\Owner\...\Run: [qcgce2mrvjq91kk1e7pnbb19m52fx] - C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe [ 2013-10-02] (ValveCorporation) <===== ATTENTION
HKU\Owner\...\Winlogon: [Shell] cmd.exe [ 2010-11-20] (Microsoft Corporation) <==== ATTENTION
HKU\Owner\...\Command Processor: "C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe" <===== ATTENTION!
2013-10-02 07:17 - 2013-10-02 07:17 - 02019347 _____ C:\Users\Owner\AppData\Local\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019317 _____ C:\ProgramData\2433f433
2013-10-02 07:17 - 2013-10-02 07:17 - 02019264 _____ C:\Users\Owner\AppData\Roaming\2433f433
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.dll
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe
C:\Users\Owner\AppData\Local\Temp\ccsetup.exe
C:\Users\Owner\AppData\Local\Temp\contentDATs.exe
C:\Users\Owner\AppData\Local\Temp\GoogleToolbarInstaller_en32_signed.exe
C:\Users\Owner\AppData\Local\Temp\install_flashplayer11x32ax_gtba_aih.exe
C:\Users\Owner\AppData\Local\Temp\install_flash_player_ax_32bit.exe
C:\Users\Owner\AppData\Local\Temp\jre-7u13-windows-i586-iftw.exe
C:\Users\Owner\AppData\Local\Temp\jre-7u5-windows-i586-iftw.exe
C:\Users\Owner\AppData\Local\Temp\SecurityScan_Release.exe
C:\Users\Owner\AppData\Local\Temp\SkypeSetup.exe
*****************
 
HKU\Owner\Software\Microsoft\Windows\CurrentVersion\Run\\qcgce2mrvjq91kk1e7pnbb19m52fx => Value deleted successfully.
HKU\Owner\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell => Value deleted successfully.
HKU\Owner\Software\Microsoft\Command Processor\\AutoRun => Value deleted successfully.
C:\Users\Owner\AppData\Local\2433f433 => Moved successfully.
C:\ProgramData\2433f433 => Moved successfully.
C:\Users\Owner\AppData\Roaming\2433f433 => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.dll => Moved successfully.
"C:\Users\Owner\AppData\Local\Temp\avddddqvtrttdsdoij.exe" => File/Directory not found.
C:\Users\Owner\AppData\Local\Temp\ccsetup.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\contentDATs.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\GoogleToolbarInstaller_en32_signed.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\install_flashplayer11x32ax_gtba_aih.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\install_flash_player_ax_32bit.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\jre-7u13-windows-i586-iftw.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\jre-7u5-windows-i586-iftw.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\SecurityScan_Release.exe => Moved successfully.
C:\Users\Owner\AppData\Local\Temp\SkypeSetup.exe => Moved successfully.
 
==== End of Fixlog ====


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:09 PM

Posted 02 October 2013 - 03:06 PM



Hello sippingit

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 sippingit

sippingit
  • Topic Starter

  • Members
  • 4 posts
  • OFFLINE
  •  
  • Local time:11:09 PM

Posted 02 October 2013 - 04:58 PM

Hi Gringo,

 

this is from junware removal. I was not able to do the adwcleaner scan for some reason.

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.3 (09.27.2013:1)
OS: Windows 7 Home Premium x86
Ran by Owner on Wed 10/02/2013 at 17:51:09.49
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

 

~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\protector_dll.protectorbho
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\protector_dll.protectorbho.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\yt.ytnavassistplugin
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\yt.ytnavassistplugin.1
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{058F0E48-61CA-4964-9FBA-1978A1BB060D}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{18F33C35-8EF2-40D7-8BA4-932B0121B472}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F25AF245-4A81-40DC-92F9-E9021F207706}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{32A11B1E-DC38-4BF4-855B-61DE86BC556A}

 

~~~ Files

 

~~~ Folders

Successfully deleted: [Folder] C:\Users\Owner\AppData\LocalLow\FCTB000100275
Successfully deleted: [Folder] "C:\ProgramData\big fish games"
Successfully deleted: [Folder] "C:\ProgramData\boost_interprocess"
Successfully deleted: [Folder] "C:\ProgramData\partner"
Successfully deleted: [Folder] "C:\Users\Owner\appdata\locallow\smartbar"
Successfully deleted: [Folder] "C:\Program Files\yontoo layers runtime"
Successfully deleted: [Folder] "C:\Program Files\Common Files\freecause"
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{01D8EA27-CD4F-48B6-845E-2C8EF30D1FCA}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{0D67CB22-6AEA-4055-B2D5-F42621588C7E}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{1E1DCF78-9B6A-44CA-9C40-2D6ECCAC165D}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{3FFB123C-D436-4E1F-B464-28FB7C1B3D6E}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{41E4F41D-DAEF-4180-876A-2540939E1742}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{47F76FAE-3341-4E8B-B1F4-28725CF86444}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{4BE8CE37-FE17-4C82-B1D5-A47CA3948885}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{52172230-613C-436F-9EFA-386E2B13E6AC}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{61AA7EA9-B538-4810-AC5E-63BE17DF9B86}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{6942705B-A0CB-440A-899E-E0D16323C0F9}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{6A91547C-21BB-42C5-85D3-CEFDB504ACCF}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{7EBD3792-D300-4BA2-A1F0-968DE092034C}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{8D81612E-B6BD-422D-AC0A-B04333D1AF2D}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{9AE6C6DE-ECDD-4551-849F-0F0ED0A74C03}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{9DCA1212-1EB3-4EEE-A5F1-EF68B9CC8357}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{A5C490E8-97C4-417B-A98F-2AD4C2B1DA20}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{A93E6547-6C9D-4A91-AD6A-89D90A2C6776}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{AB3212A9-DC7E-4924-9810-BFB59E2660BB}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{B6BE7384-8E18-43D0-BC8D-3781AE4C413C}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{BB3B19D2-B983-47B4-AC12-A6925C13B85F}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{E0C649E7-96D4-42EC-8D4C-99C92CD70475}
Successfully deleted: [Empty Folder] C:\Users\Owner\appdata\local\{F4E5A1F0-A159-4F85-A74B-8A9851C28E2D}

 

~~~ Chrome

Successfully deleted: [Folder] C:\Users\Owner\appdata\local\Google\Chrome\User Data\Default\Extensions\amfclgbdpgndipgoegfpkkgobahigbcl

 

~~~ Event Viewer Logs were cleared

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 10/02/2013 at 17:54:15.70
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:09 PM

Posted 02 October 2013 - 06:12 PM


Hello sippingit

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:09 PM

Posted 07 October 2013 - 12:39 AM



Hello

48 Hour bump

It has been more than 48 hours since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:09 PM

Posted 11 October 2013 - 02:53 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users