Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Possible ZeroAccess Infection - NOT a duplicate


  • This topic is locked This topic is locked
13 replies to this topic

#1 Dragonsen

Dragonsen

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 11 November 2013 - 11:03 AM

Yes, I am aware that I have a very similar topic already started. I have more than one computer on my home network. This computer I am referencing now is the main server that originally downloaded the file with the ZeroAccess infection but the file was never ran on this PC. It was ran over the network and infected the gaming PC. I just want to make sure that this main server is not infected. I have ran Malwarebytes and Microsoft Security Essentials on this server as well. They found the initial file and erased it. Below are my DDS logs.

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 9.0.8112.16514  BrowserJavaVersion: 10.45.2
Run by David at 8:57:22 on 2013-11-11
Microsoft® Windows Vista™ Business   6.0.6002.2.1252.1.1033.18.1919.917 [GMT -7:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Microsoft Security Essentials *Enabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
c:\Program Files\Microsoft Security Client\MsMpEng.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\Ati2evxx.exe
C:\Windows\System32\spoolsv.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Windows\system32\CISVC.EXE
C:\Windows\system32\FsUsbExService.Exe
C:\Windows\system32\inetsrv\inetinfo.exe
C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\Microsoft SQL Server\90\DTS\Binn\MsDtsSrvr.exe
C:\Program Files\Microsoft SQL Server\MSSQL.2\MSSQL\Binn\msftesql.exe
C:\Windows\system32\mqsvc.exe
C:\Program Files\Microsoft SQL Server\MSSQL.1\OLAP\bin\msmdsrv.exe
C:\Program Files\Microsoft SQL Server\MSSQL.2\MSSQL\Binn\sqlservr.exe
c:\Windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe
C:\Program Files\No-IP\ducservice.exe
C:\Program Files\Microsoft SQL Server\MSSQL.3\Reporting Services\ReportServer\bin\ReportingServicesService.exe
C:\Windows\System32\snmp.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
C:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Windows\System32\WUDFHost.exe
C:\Windows\system32\mqtgsvc.exe
C:\Program Files\Microsoft SQL Server\MSSQL.2\MSSQL\Binn\SQLAGENT90.EXE
c:\Windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe
c:\Program Files\Microsoft Security Client\NisSrv.exe
C:\Windows\System32\alg.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Browny02\Brother\BrStMonW.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Program Files\Logitech\SetPointP\SetPoint.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\iTunes\iTunesHelper.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\SAMSUNG\Kies\KiesTrayAgent.exe
C:\Program Files\No-IP\DUC40.exe
C:\Program Files\SAMSUNG\Kies\Kies.exe
C:\Program Files\Microsoft Office\Office14\ONENOTEM.EXE
C:\Program Files\Browny02\BrYNSvc.exe
C:\Program Files\Windows Media Player\wmpnscfg.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Common Files\LogiShrd\KHAL3\KHALMNPR.EXE
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k apphost
C:\Windows\System32\svchost.exe -k ipripsvc
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\system32\svchost.exe -k iissvcs
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.facebook.com/
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Office Document Cache Handler: {B4F3A835-0E21-4959-BA22-42B3008E02FF} - c:\program files\microsoft office\office14\URLREDIR.DLL
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
BHO: GretechBHO Class: {F0181C6E-9218-4792-9F3C-E8DF52B2F1AC} - c:\program files\gretech\gompicker\GomPickerBHO.dll
uRun: [googletalk] c:\users\david\appdata\roaming\google\google talk\googletalk.exe /autostart
uRun: [NoIPDUCv4] "c:\program files\no-ip\DUC40.exe" /minimize
uRun: [KiesPreload] c:\program files\samsung\kies\Kies.exe /preload
uRun: [] c:\program files\samsung\kies\external\firmwareupdate\KiesPDLR.exe Run
uRun: [KiesPDLR] c:\program files\samsung\kies\external\firmwareupdate\KiesPDLR.exe
mRun: [Windows Defender] c:\program files\windows defender\MSASCui.exe -hide
mRun: [MsmqIntCert] regsvr32 /s mqrt.dll
mRun: [BrStsMon00] c:\program files\browny02\brother\BrStMonW.exe /AUTORUN
mRun: [APSDaemon] "c:\program files\common files\apple\apple application support\APSDaemon.exe"
mRun: [LogMeIn GUI] "c:\program files\logmein\x86\LogMeInSystray.exe"
mRun: [EvtMgr6] c:\program files\logitech\setpointp\SetPoint.exe /launchGaming
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [QuickTime Task] "c:\program files\quicktime\QTTask.exe" -atboottime
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [KiesHelper] c:\program files\samsung\kies\KiesHelper.exe /s
mRun: [KiesTrayAgent] c:\program files\samsung\kies\KiesTrayAgent.exe
StartupFolder: c:\users\david\appdata\roaming\micros~1\windows\startm~1\programs\startup\onenot~1.lnk - c:\program files\microsoft office\office14\ONENOTEM.EXE
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\privoxy.lnk - c:\program files\privoxy\privoxy.exe
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-System: EnableLUA = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
mPolicies-System: LocalAccountTokenFilterPolicy = dword:1
IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\progra~1\micros~2\office14\ONBttnIE.dll/105
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office14\ONBttnIE.dll
IE: {789FE86F-6FC4-46A1-9849-EDE0DB0C95CA} - {FFFDC614-B694-4AE6-AB38-5D6374584B52} - c:\program files\microsoft office\office14\ONBttnIELinkedNotes.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_37-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0037-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_37-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} - hxxp://java.sun.com/update/1.6.0/jinstall-1_6_0_37-windows-i586.cab
TCP: NameServer = 10.12.5.55
TCP: Interfaces\{C8685ACA-4BC0-4214-8A21-315787DED3AE} : DHCPNameServer = 10.12.5.55
Filter: text/xml - {807573E5-5146-11D5-A672-00B0D022E945} - c:\program files\common files\microsoft shared\office14\MSOXMLMF.DLL
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\david\appdata\roaming\mozilla\firefox\profiles\818vubah.default\
FF - prefs.js: browser.startup.homepage - hxxp://elliquiy.com/forums/index.php
FF - prefs.js: keyword.URL -
FF - prefs.js: network.proxy.ftp - 10.12.5.101
FF - prefs.js: network.proxy.ftp_port - 8118
FF - prefs.js: network.proxy.http - 10.12.5.101
FF - prefs.js: network.proxy.http_port - 8118
FF - prefs.js: network.proxy.socks - 10.12.5.101
FF - prefs.js: network.proxy.socks_port - 8118
FF - prefs.js: network.proxy.ssl - 10.12.5.101
FF - prefs.js: network.proxy.ssl_port - 8118
FF - prefs.js: network.proxy.type - 4
FF - plugin: c:\progra~1\micros~2\office14\NPAUTHZ.DLL
FF - plugin: c:\progra~1\micros~2\office14\NPSPWRAP.DLL
FF - plugin: c:\program files\adobe\reader 10.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\java\jre7\bin\dtplugin\npdeployJava1.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\microsoft silverlight\5.1.20913.0\npctrlui.dll
FF - plugin: c:\users\david\appdata\roaming\mozilla\firefox\profiles\818vubah.default\extensions\logmeinclient@logmein.com\plugins\npRACtrl.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_9_900_117.dll
FF - ExtSQL: 2013-10-20 01:22; https-everywhere@eff.org; c:\users\david\appdata\roaming\mozilla\firefox\profiles\818vubah.default\extensions\https-everywhere@eff.org
.
============= SERVICES / DRIVERS ===============
.
R0 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2013-6-18 211560]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 FsUsbExService;FsUsbExService;c:\windows\system32\FsUsbExService.Exe [2013-11-8 233472]
R2 iprip;RIP Listener;c:\windows\system32\svchost.exe -k ipripsvc [2008-1-20 21504]
R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\logmein\x86\LMIGuardianSvc.exe [2012-1-31 375120]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\logmein\x86\rainfo.sys [2011-9-16 13624]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [2012-2-23 47640]
R2 MsDtsServer;SQL Server Integration Services;c:\program files\microsoft sql server\90\dts\binn\MsDtsSrvr.exe [2012-8-23 203368]
R2 msftesql$BELNAPACCOUNTING;SQL Server FullText Search (BELNAPACCOUNTING);c:\program files\microsoft sql server\mssql.2\mssql\binn\msftesql.exe [2010-3-26 91992]
R2 MSOLAP$BELNAPACCOUNTING;SQL Server Analysis Services (BELNAPACCOUNTING);c:\program files\microsoft sql server\mssql.1\olap\bin\msmdsrv.exe [2012-8-23 14956136]
R2 MSSQL$BELNAPACCOUNTING;SQL Server (BELNAPACCOUNTING);c:\program files\microsoft sql server\mssql.2\mssql\binn\sqlservr.exe [2012-8-23 29299304]
R2 NisDrv;Microsoft Network Inspection System;c:\windows\system32\drivers\NisDrvWFP.sys [2012-8-30 107392]
R2 NoIPDUCService4;NO-IP DUC v4;c:\program files\no-ip\ducservice.exe [2013-1-24 11264]
R2 ReportServer$BELNAPACCOUNTING;SQL Server Reporting Services (BELNAPACCOUNTING);c:\program files\microsoft sql server\mssql.3\reporting services\reportserver\bin\ReportingServicesService.exe [2012-8-23 14440]
R2 SQLAgent$BELNAPACCOUNTING;SQL Server Agent (BELNAPACCOUNTING);c:\program files\microsoft sql server\mssql.2\mssql\binn\SQLAGENT90.EXE [2010-12-10 346976]
R2 SSPORT;SSPORT;c:\windows\system32\drivers\SSPORT.SYS [2012-1-9 5120]
R3 BrYNSvc;BrYNSvc;c:\program files\browny02\BrYNSvc.exe [2012-2-4 245760]
R3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2013-11-8 37344]
R3 NisSrv;Microsoft Network Inspection;c:\program files\microsoft security client\NisSrv.exe [2013-8-12 295376]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S3 A3AB;D-Link AirPro 802.11a/b Wireless Adapter Service(A3AB);c:\windows\system32\drivers\A3ABv.sys [2011-10-30 738304]
S3 dgderdrv;dgderdrv;c:\windows\system32\drivers\dgderdrv.sys [2011-8-22 20032]
S3 ssadbus;SAMSUNG Android USB Composite Device driver (WDM);c:\windows\system32\drivers\ssadbus.sys [2013-11-10 121192]
S3 ssadmdfl;SAMSUNG Android USB Modem (Filter);c:\windows\system32\drivers\ssadmdfl.sys [2013-11-10 12776]
S3 ssadmdm;SAMSUNG Android USB Modem Drivers;c:\windows\system32\drivers\ssadmdm.sys [2013-11-10 136680]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2008-5-6 11520]
S3 WMSvc;Web Management Service;c:\windows\system32\inetsrv\WMSvc.exe [2008-1-20 11264]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2013-7-20 754856]
S3 WSDScan;WSD Scan Support via UMB;c:\windows\system32\drivers\WSDScan.sys [2011-10-31 19968]
S4 msvsmon80;Visual Studio 2005 Remote Debugger;c:\program files\microsoft visual studio 8\common7\ide\remote debugger\x86\msvsmon.exe [2007-2-22 2808664]
.
=============== Created Last 30 ================
.
2013-11-11 15:18:45    --------    d-----w-    c:\programdata\Malwarebytes' Anti-Malware (portable)
2013-11-11 15:18:43    105176    ----a-w-    c:\windows\system32\drivers\MBAMSwissArmy.sys
2013-11-11 15:15:52    75992    ----a-w-    c:\windows\system32\drivers\mbamchameleon.sys
2013-11-10 16:46:54    770912    ----a-w-    c:\windows\system32\Msfdbqp.dll
2013-11-10 16:46:54    511328    ----a-w-    c:\windows\system32\Synchronization2.dll
2013-11-10 16:46:54    397152    ----a-w-    c:\windows\system32\Msfdbse.dll
2013-11-10 16:46:54    253280    ----a-w-    c:\windows\system32\MetaStore2.dll
2013-11-10 16:46:54    230240    ----a-w-    c:\windows\system32\Msfdb.dll
2013-11-10 16:46:54    189792    ----a-w-    c:\windows\system32\SimpleProviders2.dll
2013-11-10 16:46:54    171360    ----a-w-    c:\windows\system32\FileSyncProvider2.dll
2013-11-10 16:46:54    156512    ----a-w-    c:\windows\system32\FeedSync2.dll
2013-11-10 16:43:40    --------    d-----w-    c:\users\david\{57a484cc-f5ab-4685-885c-89bf368d878f}
2013-11-10 16:43:06    --------    d-----w-    c:\users\david\{1f40f6c1-9270-4313-a065-03d145cdb00d}
2013-11-10 16:43:02    --------    d-----w-    c:\users\david\{ee7b4def-a634-46e8-a0b8-b1c8b7ba5096}
2013-11-10 16:42:57    --------    d-----w-    c:\users\david\{dc188c11-5c8e-4773-adc4-fe59b88ee653}
2013-11-10 16:15:17    319456    ----a-w-    c:\windows\system32\DIFxAPI.dll
2013-11-10 10:33:55    7796464    ----a-w-    c:\programdata\microsoft\microsoft antimalware\definition updates\{7c4926b4-5c1d-4167-9ed3-a7d88b410b67}\mpengine.dll
2013-11-10 09:03:03    7796464    ----a-w-    c:\programdata\microsoft\microsoft antimalware\definition updates\backup\mpengine.dll
2013-11-09 04:24:28    --------    d-----w-    c:\program files\PhotoScape
2013-11-09 04:23:45    --------    d-----w-    c:\program files\MyFree Codec
2013-11-09 04:18:54    --------    d-----w-    c:\users\david\{15beadc6-f583-46a6-a6db-f08cfe38aed5}
2013-11-09 04:15:58    --------    d-----w-    c:\users\david\appdata\roaming\Ivan Bochko
2013-11-09 04:15:53    37344    ----a-w-    c:\windows\system32\FsUsbExDisk.Sys
2013-11-09 04:15:53    233472    ----a-w-    c:\windows\system32\FsUsbExService.Exe
2013-11-09 04:15:53    110592    ----a-w-    c:\windows\system32\FsUsbExDevice.Dll
2013-11-09 04:08:40    --------    d-----w-    c:\users\david\appdata\local\Samsung
2013-11-09 04:06:38    4659712    ----a-w-    c:\windows\system32\Redemption.dll
2013-11-09 04:06:17    --------    d-----w-    c:\program files\MarkAny
2013-11-09 04:04:55    --------    d-----w-    c:\users\david\appdata\roaming\Samsung
2013-11-09 04:03:57    --------    d-----w-    c:\users\david\appdata\local\Downloaded Installations
2013-11-08 01:13:51    719224    ------w-    c:\programdata\microsoft\microsoft antimalware\definition updates\{d7837b90-e1c8-473f-b4a5-35a90e2d046a}\gapaengine.dll
2013-11-07 09:22:06    --------    d-----w-    c:\programdata\Vitalwerks
2013-11-07 09:21:20    --------    d-----w-    c:\users\david\appdata\local\Vitalwerks
2013-11-07 09:21:16    --------    d-----w-    c:\program files\No-IP
2013-10-31 00:59:59    --------    d-----w-    c:\program files\TAP-Windows
2013-10-31 00:59:57    --------    d-----w-    c:\program files\OpenVPN
2013-10-25 13:19:57    --------    d-----w-    c:\program files\Raxco
2013-10-24 05:18:53    --------    d-----w-    c:\programdata\Auslogics
2013-10-22 23:09:12    --------    d-----w-    C:\DR Brain
2013-10-22 20:54:11    --------    d-----w-    c:\program files\Privoxy
2013-10-19 00:07:21    --------    d-----w-    c:\programdata\Oracle
2013-10-16 13:59:39    94632    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
2013-10-14 03:22:16    --------    d-----w-    c:\program files\iPod
2013-10-14 03:21:38    --------    d-----w-    c:\programdata\188F1432-103A-4ffb-80F1-36B633C5C9E1
2013-10-14 03:21:38    --------    d-----w-    c:\program files\iTunes
.
==================== Find3M  ====================
.
2013-10-30 05:20:10    86888    ----a-w-    c:\windows\system32\LMIRfsClientNP.dll
2013-10-30 05:20:09    53064    ----a-w-    c:\windows\system32\spool\prtprocs\w32x86\LMIproc.dll
2013-10-30 05:20:07    31560    ----a-w-    c:\windows\system32\LMIport.dll
2013-10-30 05:20:06    85832    ----a-w-    c:\windows\system32\LMIinit.dll
2013-10-30 03:07:00    330240    ----a-w-    c:\windows\MASetupCaller.dll
2013-10-30 03:06:54    45320    ----a-w-    c:\windows\system32\MAMACExtract.dll
2013-10-24 00:21:30    16400    ----a-w-    c:\windows\system32\drivers\LNonPnP.sys
2013-10-08 18:55:48    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-10-08 18:55:48    692616    ----a-w-    c:\windows\system32\FlashPlayerApp.exe
2013-09-22 10:22:59    1800704    ----a-w-    c:\windows\system32\jscript9.dll
2013-09-22 10:14:39    1427968    ----a-w-    c:\windows\system32\inetcpl.cpl
2013-09-22 10:13:22    1129472    ----a-w-    c:\windows\system32\wininet.dll
2013-09-22 10:08:41    142848    ----a-w-    c:\windows\system32\ieUnatt.exe
2013-09-22 10:06:58    420864    ----a-w-    c:\windows\system32\vbscript.dll
2013-09-22 10:03:18    2382848    ----a-w-    c:\windows\system32\mshtml.tlb
2013-08-29 07:36:04    2050048    ----a-w-    c:\windows\system32\win32k.sys
2013-08-27 02:47:50    219648    ----a-w-    c:\windows\system32\d3d10_1core.dll
2013-08-27 02:47:50    189952    ----a-w-    c:\windows\system32\d3d10core.dll
2013-08-27 02:47:50    160768    ----a-w-    c:\windows\system32\d3d10_1.dll
2013-08-27 02:47:50    1029120    ----a-w-    c:\windows\system32\d3d10.dll
2013-08-27 01:52:08    1172480    ----a-w-    c:\windows\system32\d3d10warp.dll
2013-08-27 01:50:40    486400    ----a-w-    c:\windows\system32\d3d10level9.dll
2013-08-27 01:32:20    683008    ----a-w-    c:\windows\system32\d2d1.dll
2013-08-27 01:28:36    1069056    ----a-w-    c:\windows\system32\DWrite.dll
2013-08-27 01:28:35    798208    ----a-w-    c:\windows\system32\FntCache.dll
2013-08-22 12:40:22    35288    ----a-w-    c:\windows\system32\drivers\tap0901.sys
2009-09-27 15:39:26    369152    --sh--w-    c:\windows\system32\avisynth.dll
2005-07-14 18:31:20    32256    --sh--w-    c:\windows\system32\AVSredirect.dll
2004-02-22 16:11:08    719872    --sh--w-    c:\windows\system32\devil.dll
2004-01-25 06:00:00    70656    --sh--w-    c:\windows\system32\i420vfw.dll
2012-10-06 01:54:00    188416    --sha-w-    c:\windows\system32\winDCE32.dll
2004-01-25 06:00:00    70656    --sh--w-    c:\windows\system32\yv12vfw.dll
.
============= FINISH:  8:58:27.62 ===============
 

 

Attached Files


"Knowledge is the gathering of useless information."


BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 40,169 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:10 AM

Posted 13 November 2013 - 09:33 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Nothing suspicious was found on your DDS log.

Lets continue.

--RogueKiller--
  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • The log should be found in RKreport[1].txt on your Desktop
  • Exit/Close RogueKiller+
===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
thisisujrt.gif Please download
Junkware Removal Tool to your Desktop.
  • Please close your security software to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista or 7, right-mouse click it and select Run as administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete, depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your Desktop and will automatically open.
  • Please post the contents of JRT.txt into your reply.
===

Please download ComboFix from any of the links below, and save it to your desktop. For information regarding this download, please visit this web page: Turorial
Link 1
Link 2

IMPORTANT !!! Save ComboFix.exe to your Desktop

1. Close any open browsers.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.
3. Do not install any other programs until this if fixed.


How to : Disable Anti-virus and Firewall...
http://www.bleepingcomputer.com/forums/topic114351.html

Double click on ComboFix.exe and follow the prompts.
  • When finished, it will produce a report for you.
  • Please post the C:\ComboFix.txt
Note: Do not mouse click ComboFix's window while it's running. That may cause it to stall

Note: If you have difficulty properly disabling your protective programs, refer to this link --> http://www.bleepingcomputer.com/forums/topic114351.html

Note: If after running ComboFix you get this error message "Illegal operation attempted on a registry key that has been marked for deletion." when attempting to run a program all you need to do is restart the computer to reset the registry.
===

Please paste the logs in your next reply DO NOT ATTACH THEM.
Let me know what problem persists.

#3 Dragonsen

Dragonsen
  • Topic Starter

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 13 November 2013 - 12:02 PM

RogueKiller Log

 

RogueKiller V8.7.7 [Nov 11 2013] by Tigzy
mail : tigzyRK<at>gmail<dot>com
Feedback : http://www.adlice.com/forum/
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : David [Admin rights]
Mode : Remove -- Date : 11/13/2013 10:00:53
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 4 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)
[HJ SMENU][PUM] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> REPLACED (1)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 3 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
[Inline] EAT @firefox.exe (?NullHandleValue@JS@@3V?$Handle@VValue@JS@@@1@B) : mozjs.dll -> HOOKED (Unknown @ 0x3FBFFEA4)
[Inline] EAT @firefox.exe (?UndefinedHandleValue@JS@@3V?$Handle@VValue@JS@@@1@B) : mozjs.dll -> HOOKED (Unknown @ 0x37BC4EA8)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1       localhost
::1             localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) SAMSUNG HD080HJ/P ATA Device +++++
--- User ---
[MBR] 415b2c0fe84affa2caf12e91b12e0121
[BSP] f2c0d751f98c2602a32876944748cd7c : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 76317 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) WDC WD400BD-75JMA0 ATA Device +++++
--- User ---
[MBR] daafa2d4f6aceef821760eaca9dfef0c
[BSP] 11d467b9f31927f29d49c85858b51038 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 38144 Mo
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive2: (\\.\PHYSICALDRIVE2 @ IDE) ST3160215A ATA Device +++++
--- User ---
[MBR] 0d1c93d0bf8dbdc1f6f6b6adc57a8bd8
[BSP] fc9408f6b2fb2dc0ca2c336bf9ebdc12 : Windows Vista MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 152626 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_D_11132013_100053.txt >>
RKreport[0]_S_11132013_100030.txt


 


"Knowledge is the gathering of useless information."


#4 Dragonsen

Dragonsen
  • Topic Starter

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 13 November 2013 - 12:12 PM

AdwCleaner Log

 

# AdwCleaner v3.012 - Report created 13/11/2013 at 10:02:25
# Updated 11/11/2013 by Xplode
# Operating System : Windows Vista ™ Business Service Pack 2 (32 bits)
# Username : David - ZEUS-SERVER
# Running from : C:\Users\David\Downloads\adwcleaner.exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Found C:\Program Files\BitLord 2
Folder Found C:\Program Files\myfree codec
Folder Found C:\ProgramData\Microsoft\Windows\Start Menu\Programs\myfree codec
Folder Found C:\Users\David\AppData\Local\SwvUpdater
Folder Found C:\Users\David\AppData\Roaming\BitLord
Folder Found C:\Users\David\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\BitLord
Folder Found C:\Users\David\Documents\BitLord

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Found : HKCU\Software\AppDataLow\Software\Crossrider
Key Found : HKCU\Software\Cr_Installer
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{99C91FC5-DB5B-4AA0-BB70-5D89C5A4DF96}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\MyFreeCodec
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Uninstall\MyFreeCodec
Key Found : HKCU\Software\Myfree Codec
Key Found : HKLM\SOFTWARE\Classes\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56}
Key Found : HKLM\SOFTWARE\Classes\AppID\secman.DLL
Key Found : HKLM\SOFTWARE\Classes\CLSID\{00000001-4FEF-40D3-B3FA-E0531B897F98}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{5C3B5DAA-0AFF-4808-90FB-0F2F2D760E36}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{64697678-0000-0010-8000-00AA00389B71}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{DE9028D0-5FFA-4E69-94E3-89EE8741F468}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Key Found : HKLM\SOFTWARE\Classes\CLSID\{FD501041-8EBE-11CE-8183-00AA00577DA2}
Key Found : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Key Found : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Key Found : HKLM\SOFTWARE\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}
Key Found : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}
Key Found : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Key Found : HKLM\Software\Description
Key Found : HKLM\Software\Myfree Codec

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16514


-\\ Mozilla Firefox v25.0 (en-US)

[ File : C:\Users\David\AppData\Roaming\Mozilla\Firefox\Profiles\818vubah.default\prefs.js ]

Line Found : user_pref("extensions.crossrider.bic", "13dbf5cd70bbac4390135290f1f751cd");

[ File : C:\Users\Phanes\AppData\Roaming\Mozilla\Firefox\Profiles\nhst02xj.default\prefs.js ]


*************************

AdwCleaner[R0].txt - [3031 octets] - [13/11/2013 10:02:25]

########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [3091 octets] ##########

 

All of the folders/programs listed are valid programs I wish to keep, with the possible exceptions of crossrider and swvupdater. However, I suspect both of those were installed with Kies since Kies installed myfree codec as well.
 


Edited by Dragonsen, 13 November 2013 - 12:13 PM.

"Knowledge is the gathering of useless information."


#5 Dragonsen

Dragonsen
  • Topic Starter

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 13 November 2013 - 12:20 PM

Junkware Removal Tool Log

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.0.8 (11.05.2013:1)
OS: Windows Vista ™ Business x86
Ran by David on Wed 11/13/2013 at 10:15:09.17
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\AppID\{4D076AB4-7562-427A-B5D2-BD96E19DEE56}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\AppID\secman.dll
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{DE9028D0-5FFA-4E69-94E3-89EE8741F468}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8FFE}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\TypeLib\{11549FE4-7C5A-4C17-9FC3-56FC5162A994}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\cr_installer
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\AppDataLow\software\crossrider
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{11111111-1111-1111-1111-110111251155}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{11111111-1111-1111-1111-110111251155}



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\Users\David\appdata\local\jollywallet"
Successfully deleted: [Folder] "C:\Users\David\appdata\local\swvupdater"
Successfully deleted: [Folder] "C:\Program Files\myfree codec"



~~~ FireFox

Successfully deleted the following from C:\Users\David\AppData\Roaming\mozilla\firefox\profiles\818vubah.default\prefs.js

user_pref("extensions.crossrider.bic", "13dbf5cd70bbac4390135290f1f751cd");
Emptied folder: C:\Users\David\AppData\Roaming\mozilla\firefox\profiles\818vubah.default\minidumps [96 files]



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 11/13/2013 at 10:17:12.29
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

I noticed that this program deleted the programs I wished to keep in the first place, namely myfree codec. Guess I will just have to reinstall them.


"Knowledge is the gathering of useless information."


#6 Dragonsen

Dragonsen
  • Topic Starter

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 13 November 2013 - 12:56 PM

ComboFix Log

 

ComboFix 13-11-12.01 - David 11/13/2013  10:24:51.1.2 - x86
Microsoft® Windows Vista™ Business   6.0.6002.2.1252.1.1033.18.1919.909 [GMT -7:00]
Running from: c:\users\David\Downloads\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
C:\Install.exe
c:\programdata\Microsoft Corporation\Microsoft® Windows® Operating System
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\11628AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\11628IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\11628IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\11628IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\11628IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1468AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1468IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1468IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1468IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1468IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1540AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1748AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1748IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1748IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1748IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\1748IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\192AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2000AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2256AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2256IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2256IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2256IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2256IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2292AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2292IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2292IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2292IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2292IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2676AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2676IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2676IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2676IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\2676IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3032AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3032DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3032DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3032DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3032DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\308AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3100AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3180AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3240AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3332AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3440AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3580AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3612AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3680AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3724AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3724IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3724IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3724IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3724IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3864AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3884AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\392AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\3940AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4080AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4080IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4080IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4080IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4080IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4124AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4148AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4260AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4348AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4396AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4404AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4416AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4416DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4416DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4416DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4416DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4448AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4564AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4588AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4664AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4680AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4680IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4680IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4680IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4680IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4756AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4888AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4888DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4888DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4888DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\4888DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\492AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5012AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5012IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5012IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5012IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5012IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5024AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5056AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5072AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5132AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5132DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5132DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5132DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5132DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5244AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5244IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5244IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5244IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5244IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\528AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5396AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5396IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5396IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5396IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5396IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5492AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5532AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5532IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5532IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5532IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5532IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5572AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5588AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5632AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5632DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5632DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5632DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5632DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5680AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5680IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5680IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5680IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5680IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5692AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5716AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5716IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5716IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5716IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5716IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5816AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5944AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\5964AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6068AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6116AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6116DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6116DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6116DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6116DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6136AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6136IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6136IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6136IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6136IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\620AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6248AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6248IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6248IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6248IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6248IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6748AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6748DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6748DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6748DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\6748DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7544AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7544IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7544IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7544IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7544IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7604AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7604IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7604IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7604IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7604IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7988AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7988DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7988DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7988DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\7988DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\824AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\824IdahoSkinInstituteMedSpapffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\824IdahoSkinInstituteMedSpareviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\824IdahoSkinInstituteMedSpareviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\824IdahoSkinInstituteMedSpataskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\948AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\9556AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\968AccountantCenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\968DCAccountspffcenter.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\968DCAccountsreviewDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\968DCAccountsreviewNotesPopUp.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\968DCAccountstaskNotesDialog.html
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\ac.css
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\ac.js
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\close_pop.png
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\jq.css
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\jquery.corner.js
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\jquery.min.js
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\mootools.svn.js
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\pffCenter.css
c:\users\David\AppData\Local\Microsoft\Windows\Temporary Internet Files\pffCenter.js
c:\windows\system32\drivers\etc\hosts.ics
c:\windows\system32\FlashPlayerApp.exe
.
Infected copy of c:\windows\system32\user32.dll was found and disinfected
Restored copy from - c:\windows\winsxs\x86_microsoft-windows-user32_31bf3856ad364e35_6.0.6002.18005_none_cf23e54d6a7e4a7e\user32.dll
.
.
(((((((((((((((((((((((((   Files Created from 2013-10-13 to 2013-11-13  )))))))))))))))))))))))))))))))
.
.
2013-11-13 17:33 . 2013-11-13 17:33    --------    d-----w-    c:\users\Default\AppData\Local\temp
2013-11-13 17:15 . 2013-11-13 17:15    --------    d-----w-    c:\windows\ERUNT
2013-11-13 17:02 . 2013-11-13 17:02    --------    d-----w-    C:\AdwCleaner
2013-11-13 04:31 . 2013-10-14 06:39    7796464    ----a-w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{8D8D9354-97CB-4988-A1BC-70636BD9F2DF}\mpengine.dll
2013-11-12 04:31 . 2013-10-14 06:39    7796464    ----a-w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2013-11-12 03:36 . 2013-11-12 03:37    --------    d-----w-    c:\program files\iPod
2013-11-12 03:36 . 2013-11-12 03:37    --------    d-----w-    c:\programdata\188F1432-103A-4ffb-80F1-36B633C5C9E1
2013-11-12 03:36 . 2013-11-12 03:37    --------    d-----w-    c:\program files\iTunes
2013-11-11 15:18 . 2013-11-11 15:57    --------    d-----w-    c:\programdata\Malwarebytes' Anti-Malware (portable)
2013-11-11 15:18 . 2013-11-11 15:18    105176    ----a-w-    c:\windows\system32\drivers\MBAMSwissArmy.sys
2013-11-11 15:15 . 2013-11-11 15:15    75992    ----a-w-    c:\windows\system32\drivers\mbamchameleon.sys
2013-11-10 16:46 . 2013-11-10 16:46    770912    ----a-w-    c:\windows\system32\Msfdbqp.dll
2013-11-10 16:46 . 2013-11-10 16:46    397152    ----a-w-    c:\windows\system32\Msfdbse.dll
2013-11-10 16:46 . 2013-11-10 16:46    253280    ----a-w-    c:\windows\system32\MetaStore2.dll
2013-11-10 16:46 . 2013-11-10 16:46    230240    ----a-w-    c:\windows\system32\Msfdb.dll
2013-11-10 16:46 . 2013-11-10 16:46    189792    ----a-w-    c:\windows\system32\SimpleProviders2.dll
2013-11-10 16:46 . 2013-11-10 16:46    171360    ----a-w-    c:\windows\system32\FileSyncProvider2.dll
2013-11-10 16:46 . 2013-11-10 16:46    511328    ----a-w-    c:\windows\system32\Synchronization2.dll
2013-11-10 16:46 . 2013-11-10 16:46    156512    ----a-w-    c:\windows\system32\FeedSync2.dll
2013-11-10 16:43 . 2013-11-10 16:43    --------    d-----w-    c:\users\David\{57a484cc-f5ab-4685-885c-89bf368d878f}
2013-11-10 16:43 . 2013-11-10 16:43    --------    d-----w-    c:\users\David\{1f40f6c1-9270-4313-a065-03d145cdb00d}
2013-11-10 16:43 . 2013-11-10 16:43    --------    d-----w-    c:\users\David\{ee7b4def-a634-46e8-a0b8-b1c8b7ba5096}
2013-11-10 16:42 . 2013-11-10 16:42    --------    d-----w-    c:\users\David\{dc188c11-5c8e-4773-adc4-fe59b88ee653}
2013-11-10 16:15 . 2011-09-16 18:54    319456    ----a-w-    c:\windows\system32\DIFxAPI.dll
2013-11-09 04:24 . 2013-11-09 04:27    --------    d-----w-    c:\program files\PhotoScape
2013-11-09 04:18 . 2013-11-09 04:18    --------    d-----w-    c:\users\David\{15beadc6-f583-46a6-a6db-f08cfe38aed5}
2013-11-09 04:15 . 2013-11-09 04:15    --------    d-----w-    c:\users\David\AppData\Roaming\Ivan Bochko
2013-11-09 04:15 . 2013-10-30 03:16    233472    ----a-w-    c:\windows\system32\FsUsbExService.Exe
2013-11-09 04:15 . 2013-10-30 03:16    37344    ----a-w-    c:\windows\system32\FsUsbExDisk.Sys
2013-11-09 04:15 . 2011-09-16 18:56    110592    ----a-w-    c:\windows\system32\FsUsbExDevice.Dll
2013-11-09 04:08 . 2013-11-10 16:21    --------    d-----w-    c:\users\David\AppData\Local\Samsung
2013-11-09 04:06 . 2013-11-10 16:46    4659712    ----a-w-    c:\windows\system32\Redemption.dll
2013-11-09 04:06 . 2013-11-09 04:06    --------    d-----w-    c:\program files\MarkAny
2013-11-09 04:04 . 2013-11-10 16:13    --------    d-----w-    c:\users\David\AppData\Roaming\Samsung
2013-11-09 04:03 . 2013-11-09 04:32    --------    d-----w-    c:\users\David\AppData\Local\Downloaded Installations
2013-11-08 05:58 . 2013-11-08 08:46    --------    d-----w-    c:\users\Phanes
2013-11-08 01:13 . 2013-10-18 09:13    719224    ------w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{D7837B90-E1C8-473F-B4A5-35A90E2D046A}\gapaengine.dll
2013-11-07 09:22 . 2013-11-07 09:22    --------    d-----w-    c:\programdata\Vitalwerks
2013-11-07 09:21 . 2013-11-07 09:21    --------    d-----w-    c:\users\David\AppData\Local\Vitalwerks
2013-11-07 09:21 . 2013-11-07 09:21    --------    d-----w-    c:\program files\No-IP
2013-10-31 00:59 . 2013-10-31 01:00    --------    d-----w-    c:\program files\TAP-Windows
2013-10-31 00:59 . 2013-10-31 07:33    --------    d-----w-    c:\program files\OpenVPN
2013-10-25 13:20 . 2013-10-25 13:20    --------    d-----w-    c:\programdata\Raxco
2013-10-25 13:19 . 2013-11-09 06:44    --------    d-----w-    c:\program files\Raxco
2013-10-24 05:18 . 2013-10-24 05:18    --------    d-----w-    c:\programdata\Auslogics
2013-10-23 03:38 . 2013-10-23 03:38    --------    d-----w-    c:\program files\7-Zip
2013-10-22 23:09 . 2013-10-22 23:10    --------    d-----w-    C:\DR Brain
2013-10-22 20:54 . 2013-11-07 09:23    --------    d-----w-    c:\program files\Privoxy
2013-10-19 17:39 . 2013-10-19 18:33    --------    d-----w-    c:\users\David\AppData\Roaming\ImgBurn
2013-10-19 17:34 . 2013-10-19 17:34    --------    d-----w-    c:\program files\ImgBurn
2013-10-19 00:07 . 2013-10-19 00:07    --------    d-----w-    c:\programdata\Oracle
2013-10-16 14:00 . 2013-10-16 14:00    --------    d-----w-    c:\program files\Common Files\Java
2013-10-16 13:59 . 2013-10-08 13:50    94632    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-10-30 05:20 . 2012-02-23 14:58    86888    ----a-w-    c:\windows\system32\LMIRfsClientNP.dll
2013-10-30 05:20 . 2012-02-23 14:58    53064    ----a-w-    c:\windows\system32\Spool\prtprocs\w32x86\LMIproc.dll
2013-10-30 05:20 . 2012-02-23 14:58    31560    ----a-w-    c:\windows\system32\LMIport.dll
2013-10-30 05:20 . 2012-02-23 14:58    85832    ----a-w-    c:\windows\system32\LMIinit.dll
2013-10-30 03:07 . 2011-09-16 18:54    330240    ----a-w-    c:\windows\MASetupCaller.dll
2013-10-30 03:06 . 2011-09-16 18:54    45320    ----a-w-    c:\windows\system32\MAMACExtract.dll
2013-10-24 00:21 . 2012-03-19 02:02    16400    ----a-w-    c:\windows\system32\drivers\LNonPnP.sys
2013-10-18 09:13 . 2012-10-05 19:27    719224    ------w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\NISBackup\gapaengine.dll
2013-10-08 18:55 . 2011-10-30 23:34    71048    ----a-w-    c:\windows\system32\FlashPlayerCPLApp.cpl
2013-09-22 10:22 . 2013-10-10 09:13    1800704    ----a-w-    c:\windows\system32\jscript9.dll
2013-09-22 10:14 . 2013-10-10 09:13    1427968    ----a-w-    c:\windows\system32\inetcpl.cpl
2013-09-22 10:13 . 2013-10-10 09:13    1129472    ----a-w-    c:\windows\system32\wininet.dll
2013-09-22 10:08 . 2013-10-10 09:13    142848    ----a-w-    c:\windows\system32\ieUnatt.exe
2013-09-22 10:06 . 2013-10-10 09:13    420864    ----a-w-    c:\windows\system32\vbscript.dll
2013-09-22 10:03 . 2013-10-10 09:13    2382848    ----a-w-    c:\windows\system32\mshtml.tlb
2013-08-29 07:36 . 2013-10-10 08:29    2050048    ----a-w-    c:\windows\system32\win32k.sys
2013-08-27 02:47 . 2013-10-10 08:29    219648    ----a-w-    c:\windows\system32\d3d10_1core.dll
2013-08-27 02:47 . 2013-10-10 08:29    189952    ----a-w-    c:\windows\system32\d3d10core.dll
2013-08-27 02:47 . 2013-10-10 08:29    160768    ----a-w-    c:\windows\system32\d3d10_1.dll
2013-08-27 02:47 . 2013-10-10 08:29    1029120    ----a-w-    c:\windows\system32\d3d10.dll
2013-08-27 01:52 . 2013-10-10 08:29    1172480    ----a-w-    c:\windows\system32\d3d10warp.dll
2013-08-27 01:50 . 2013-10-10 08:29    486400    ----a-w-    c:\windows\system32\d3d10level9.dll
2013-08-27 01:32 . 2013-10-10 08:29    683008    ----a-w-    c:\windows\system32\d2d1.dll
2013-08-27 01:28 . 2013-10-10 08:29    1069056    ----a-w-    c:\windows\system32\DWrite.dll
2013-08-27 01:28 . 2013-10-10 08:29    798208    ----a-w-    c:\windows\system32\FntCache.dll
2013-08-22 12:40 . 2013-08-22 12:40    35288    ----a-w-    c:\windows\system32\drivers\tap0901.sys
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"googletalk"="c:\users\David\AppData\Roaming\Google\Google Talk\googletalk.exe" [2007-01-01 3739648]
"NoIPDUCv4"="c:\program files\No-IP\DUC40.exe" [2013-01-24 270336]
"KiesPreload"="c:\program files\Samsung\Kies\Kies.exe" [2013-11-06 1564528]
"KiesPDLR"="c:\program files\Samsung\Kies\External\FirmwareUpdate\KiesPDLR.exe" [2013-11-06 845168]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"MsmqIntCert"="mqrt.dll" [2009-04-11 150528]
"BrStsMon00"="c:\program files\Browny02\Brother\BrStMonW.exe" [2010-06-10 2621440]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2013-09-14 59720]
"LogMeIn GUI"="c:\program files\LogMeIn\x86\LogMeInSystray.exe" [2011-09-16 63048]
"EvtMgr6"="c:\program files\Logitech\SetPointP\SetPoint.exe" [2011-10-07 1387288]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-04-04 958576]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2013-08-12 995176]
"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2013-05-01 421888]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
"KiesTrayAgent"="c:\program files\Samsung\Kies\KiesTrayAgent.exe" [2013-11-06 311152]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2013-11-02 152392]
.
c:\users\David\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2010 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office14\ONENOTEM.EXE /tsr [2013-6-25 228552]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Privoxy.lnk - c:\program files\Privoxy\privoxy.exe [2013-3-8 370176]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
"LocalAccountTokenFilterPolicy"= 1 (0x1)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-3049398045-1348039079-52476717-1000]
"EnableNotificationsRef"=dword:00000001
.
R3 A3AB;D-Link AirPro 802.11a/b Wireless Adapter Service(A3AB);c:\windows\system32\DRIVERS\A3ABv.sys [2007-06-30 738304]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork    REG_MULTI_SZ       PLA DPS BFE mpssvc
ipripsvc    REG_MULTI_SZ       iprip
LocalServiceAndNoImpersonation    REG_MULTI_SZ       FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2013-11-13 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-13 18:55]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.facebook.com/
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105
TCP: DhcpNameServer = 10.12.5.55
FF - ProfilePath - c:\users\David\AppData\Roaming\Mozilla\Firefox\Profiles\818vubah.default\
FF - prefs.js: browser.startup.homepage - hxxp://elliquiy.com/forums/index.php|http://www.bleepingcomputer.com/admissions/
FF - prefs.js: keyword.URL -
FF - prefs.js: network.proxy.ftp - 10.12.5.101
FF - prefs.js: network.proxy.ftp_port - 8118
FF - prefs.js: network.proxy.http - 10.12.5.101
FF - prefs.js: network.proxy.http_port - 8118
FF - prefs.js: network.proxy.socks - 10.12.5.101
FF - prefs.js: network.proxy.socks_port - 8118
FF - prefs.js: network.proxy.ssl - 10.12.5.101
FF - prefs.js: network.proxy.ssl_port - 8118
FF - prefs.js: network.proxy.type - 4
FF - ExtSQL: 2013-10-20 01:22; https-everywhere@eff.org; c:\users\David\AppData\Roaming\Mozilla\Firefox\Profiles\818vubah.default\extensions\https-everywhere@eff.org
.
- - - - ORPHANS REMOVED - - - -
.
HKLM-Run-KiesHelper - c:\program files\Samsung\Kies\KiesHelper.exe
SafeBoot-WudfPf
SafeBoot-WudfRd
AddRemove-KB2463332_DTS9 - c:\windows\DTS9_KB2463332_ENU\Hotfix.exe
AddRemove-KB2463332_NS9 - c:\windows\NS9_KB2463332_ENU\Hotfix.exe
AddRemove-KB2463332_OLAP9 - c:\windows\OLAP9_KB2463332_ENU\Hotfix.exe
AddRemove-KB2463332_RS9 - c:\windows\RS9_KB2463332_ENU\Hotfix.exe
AddRemove-KB2463332_SQL9 - c:\windows\SQL9_KB2463332_ENU\Hotfix.exe
AddRemove-KB2463332_SQLTools9 - c:\windows\SQLTools9_KB2463332_ENU\Hotfix.exe
AddRemove-{D0795B21-0CDA-4a92-AB9E-6E92D8111E44} - c:\users\David\AppData\Local\Temp\SAMSUNG\USB Drivers\-r\Uninstall.exe
AddRemove-01_Simmental - c:\program files\SAMSUNG\USB Drivers\01_Simmental\Uninstall.exe
AddRemove-02_Siberian - c:\program files\SAMSUNG\USB Drivers\02_Siberian\Uninstall.exe
AddRemove-03_Swallowtail - c:\users\David\AppData\Local\Temp\SAMSUNG\USB Drivers\-r\03_Swallowtail\Uninstall.exe
AddRemove-04_semseyite - c:\users\David\AppData\Local\Temp\SAMSUNG\USB Drivers\-r\04_semseyite\Uninstall.exe
AddRemove-05_Sloan - c:\program files\SAMSUNG\USB Drivers\05_Sloan\Uninstall.exe
AddRemove-06_Spencer - c:\program files\SAMSUNG\USB Drivers\06_Spencer\Uninstall.exe
AddRemove-07_Schorl - c:\program files\SAMSUNG\USB Drivers\07_Schorl\Uninstall.exe
AddRemove-08_EMPChipset - c:\program files\SAMSUNG\USB Drivers\08_EMPChipset\Uninstall.exe
AddRemove-09_Hsp - c:\program files\SAMSUNG\USB Drivers\09_Hsp\Uninstall.exe
AddRemove-11_HSP_Plus_Default - c:\program files\SAMSUNG\USB Drivers\11_HSP_Plus_Default\Uninstall.exe
AddRemove-16_Shrewsbury - c:\users\David\AppData\Local\Temp\SAMSUNG\USB Drivers\-r\16_Shrewsbury\Uninstall.exe
AddRemove-17_EMP_Chipset2 - c:\program files\SAMSUNG\USB Drivers\17_EMP_Chipset2\Uninstall.exe
AddRemove-18_Zinia_Serial_Driver - c:\program files\SAMSUNG\USB Drivers\18_Zinia_Serial_Driver\Uninstall.exe
AddRemove-19_VIA_driver - c:\program files\SAMSUNG\USB Drivers\19_VIA_driver\Uninstall.exe
AddRemove-20_NXP_Driver - c:\program files\SAMSUNG\USB Drivers\20_NXP_Driver\Uninstall.exe
AddRemove-21_Searsburg - c:\program files\SAMSUNG\USB Drivers\21_Searsburg\Uninstall.exe
AddRemove-22_WiBro_WiMAX - c:\program files\SAMSUNG\USB Drivers\22_WiBro_WiMAX\Uninstall.exe
AddRemove-24_flashusbdriver - c:\program files\SAMSUNG\USB Drivers\24_flashusbdriver\Uninstall.exe
AddRemove-25_escape - c:\program files\Samsung\USB Drivers\25_escape\Uninstall.exe
AddRemove-MyFreeCodec - c:\program files\MyFree Codec\1.0b beta\uninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2013-11-13 10:40
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\msftesql$BELNAPACCOUNTING]
"ImagePath"="\"c:\program files\Microsoft SQL Server\MSSQL.2\MSSQL\Binn\msftesql.exe\" -s:MSSQL.2 -f:BELNAPACCOUNTING"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Microsoft Security Client\MsMpEng.exe
c:\windows\system32\Ati2evxx.exe
c:\windows\system32\Ati2evxx.exe
c:\program files\Common Files\Adobe\ARM\1.0\armsvc.exe
c:\program files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
c:\program files\Bonjour\mDNSResponder.exe
c:\windows\system32\CISVC.EXE
c:\windows\system32\FsUsbExService.Exe
c:\windows\system32\inetsrv\inetinfo.exe
c:\program files\LogMeIn\x86\LMIGuardianSvc.exe
c:\program files\LogMeIn\x86\RaMaint.exe
c:\program files\Microsoft SQL Server\90\DTS\Binn\MsDtsSrvr.exe
c:\program files\Microsoft SQL Server\MSSQL.2\MSSQL\Binn\msftesql.exe
c:\windows\system32\mqsvc.exe
c:\program files\Microsoft SQL Server\MSSQL.1\OLAP\bin\msmdsrv.exe
c:\program files\Microsoft SQL Server\MSSQL.2\MSSQL\Binn\sqlservr.exe
c:\windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe
c:\program files\No-IP\ducservice.exe
c:\program files\Microsoft SQL Server\MSSQL.3\Reporting Services\ReportServer\bin\ReportingServicesService.exe
c:\windows\System32\snmp.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlwriter.exe
c:\windows\system32\mqtgsvc.exe
c:\program files\Microsoft SQL Server\MSSQL.2\MSSQL\Binn\SQLAGENT90.EXE
c:\program files\LogMeIn\x86\LogMeIn.exe
c:\windows\System32\WUDFHost.exe
c:\windows\Microsoft.NET\Framework\v4.0.30319\SMSvcHost.exe
c:\program files\Windows Media Player\wmpnscfg.exe
c:\program files\Windows Media Player\wmpnetwk.exe
c:\program files\Microsoft Office\Office14\ONENOTEM.EXE
c:\program files\iPod\bin\iPodService.exe
c:\program files\Browny02\BrYNSvc.exe
c:\program files\Common Files\LogiShrd\KHAL3\KHALMNPR.EXE
c:\windows\servicing\TrustedInstaller.exe
.
**************************************************************************
.
Completion time: 2013-11-13  10:49:56 - machine was rebooted
ComboFix-quarantined-files.txt  2013-11-13 17:49
.
Pre-Run: 88,108,773,376 bytes free
Post-Run: 88,906,104,832 bytes free
.
- - End Of File - - BFBF7E1BBAE9CD6BF8E4767D1F58B712
5C616939100B85E558DA92B899A0FC36
 

I noticed that there was at least one instance that stated operation needed to be performed in and Administrative Command prompt prior to the system restart.


"Knowledge is the gathering of useless information."


#7 nasdaq

nasdaq

  • Malware Response Team
  • 40,169 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:10 AM

Posted 13 November 2013 - 01:38 PM

All of the folders/programs listed are valid programs I wish to keep, with the possible exceptions of crossrider and swvupdater. However, I suspect both of those were installed with Kies since Kies installed myfree codec as well.

It's your call, I know I would remove everything.

Check off the element(s) you wish to keep. Look at my instructions.
===

Please run this security check for my review.

Download Security Check by screen317 from here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
===

Please let me know of any remaining issues with this computer.

#8 Dragonsen

Dragonsen
  • Topic Starter

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 13 November 2013 - 07:24 PM

 Results of screen317's Security Check version 0.99.77  
 Windows Vista Service Pack 2 x86 (UAC is enabled)  
 Internet Explorer 9  
 Internet Explorer 8  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
Microsoft Security Essentials   
 Antivirus up to date!  
`````````Anti-malware/Other Utilities Check:`````````
 Malwarebytes Anti-Malware version 1.75.0.1300  
 Java 7 Update 45  
 Adobe Flash Player     11.9.900.117  
 Adobe Reader 10.1.8 Adobe Reader out of Date!  
 Mozilla Firefox (25.0)
 Mozilla Thunderbird (17.0.7)
````````Process Check: objlist.exe by Laurent````````  
 Microsoft Security Essentials MSMpEng.exe
 Microsoft Security Essentials msseces.exe
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 0 %
````````````````````End of Log``````````````````````
 

 

As far unchecking the programs, I did. The only problem is that the next tool removed the files anyway. I haven't noticed any other problems with the computer.


"Knowledge is the gathering of useless information."


#9 nasdaq

nasdaq

  • Malware Response Team
  • 40,169 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:10 AM

Posted 14 November 2013 - 09:07 AM

I noticed that this program deleted the programs I wished to keep in the first place, namely myfree codec. Guess I will just have to reinstall them.

It looks safe. I will inform the authors or these tools.
===

Get the latest version of the Adobe Reader.
http://get.adobe.com/reader/
Before your download I suggest you unckeck the box on the top right "Yes, install McAfee Security Scan Plus - optional" this is not required if you are not a McAfee subscriber. While the installation is in progress you can also deny the installation of any other programs that may be suggested.

When installed remove your old version of the Reader using the Add/Remove Programs applet if present.
<<<>>>

If all is well:

Time for some housekeeping
  • The following will implement some cleanup procedures as well as reset System Restore points:
  • Click Start > Run and copy/paste the following bold text into the Run box and click OK:
  • ComboFix /Uninstall
===


Please consider using these ideas to help secure your computer. While there is no way to guarantee safety when you use a computer, these steps will make it much less likely that you will need to endure another infection. While we really like to help people, we would rather help you protect yourself so that you won't need that help in the future.

Please either enable Automatic Updates under Start -> Control Panel -> Automatic Updates or get into the habit of checking Windows Update regularly. They usually have security updates every month. You can set Windows to notify you of Updates so that you can choose, but only do this if you believe you are able to understand which ones are needed. This is a crucial security measure.

Having an effective antivirus is a must for everyone.
In addition to many excellent commercial products there are plenty of good free antivirus programs available. I can recommend:

If you are satisfied with your current protection programs you can ignore the instructions on Antivirus or Firewall listed below.In addition to an antivirus I recommend using a firewall. A software firewall is a software program that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. I can recommend one of the following free products:Please note: Many installer offer third-party downloads that are installed automatically when you do not uncheck certain checkboxes. While most of the time not being malicious you usually do not want these on your computer. Be careful during the installation process and you will avoid seeing tons of new unwanted toolbars in your favorite web browser.

Please consider installing and running some of the following programs; they are either free or have free versions of commercial programs:

Malwarebytes Anti-Malware (MBAM)
The free version of MBAM can be used to scan the system for traces of malware. Scanning your system regularly will make it harder for malware to reside on your system.
A tutorial on using MBAM can be found here.
Please Note: Only the paid for version has real time capabilities.

SpywareBlaster
A tutorial on using SpywareBlaster to prevent malware from ever installing on your computer may be found here.

Please keep these programs up-to-date and run them whenever you suspect a problem to prevent malware problems. A number of programs have resident protection and it is a good idea to run the resident protection of one of each type of program to maintain protection. However, it is important to run only one resident program of each type since they can conflict and become less effective. That means only one antivirus, firewall and scanning anti-spyware program at a time. Passive protectors, like SpywareBlaster can be run with any of them.

Note that there are a lot of rogue programs out there that want to scare you into giving them your money and some malware actually claims to be security programs. If you get a popup for a security program that you did not install yourself, do NOT click on it and ask for help immediately. It is very important to run an antivirus and firewall, but you can't always rely on reviews and ads for information. Ask in a security forum that you trust if you are not sure. If you are unsure and looking for anti-spyware programs, you can find out if it is a rogue here:A similar category of programs is now called "scareware." Scareware programs are active infections that will pop-up on your computer and tell you that you are infected. If you look closely, it will usually have a name that looks like it might be legitimate, but it is NOT one of the programs you installed. It tells you to click and install it right away. If you click on any part of it, including the 'X' to close it, you may actually help it infect your computer further. Keeping protection updated and running resident protection can help prevent these infections. If it happens anyway, get offline as quickly as you can. Pull the internet connection cable or shut down the computer if you have to. Contact someone to help by using another computer if possible. These programs are also sometimes called 'rogues', but they are different than the older version of rogues mentioned above.

Please keep your programs up to date. This applies to Java, Adobe Flashplayer, Adobe Reader and your Internet Browsers in particular. Vulnerabilities in these programs are often exploited in order to install malware on your PC. Visiting a prepared web page suffices to infect your system.

In general Firefox, Opera and Google Chrome are considered to be more secure than Internet Explorer. In addition there are many useful addons that can protect you from possible risks:
  • WOT will warn you when you try to visit sites with poor reputation. The reputation is based on user ratings and is usually very accurate.
  • Script Blocker can help blocking many attempts to infect your system via malicious websites by only allowing scripts at sites you trust.
  • NoScript is a popular Firefox addon,
  • ScriptNo a popular Google Chrome addon.
For much more useful information, please also read Tony Klein's excellent article: How did I get infected in the first place

Hopefully these steps will help to keep you error free. If you run into more difficulty, we will certainly do what we can to help.
===

#10 Dragonsen

Dragonsen
  • Topic Starter

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 14 November 2013 - 11:08 AM

Thank you for your help. However, when I tried to updated Adobe, it said that the latest version was already installed. I went to uninstall the old version but it was not listed in my list of programs to uninstall. If you know that this is not the result of a virus then I can do my own search to find solutions to this problem so you can help others with bigger issues than mine.


"Knowledge is the gathering of useless information."


#11 nasdaq

nasdaq

  • Malware Response Team
  • 40,169 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:10 AM

Posted 14 November 2013 - 01:57 PM

This is the latest version.
Adobe Reader/Acrobat v11.0.05 released Oct 8, 2013


Download and run their uninstaller.
http://labs.adobe.com/downloads/acrobatcleaner.html

Can you now install the latest version?

#12 Dragonsen

Dragonsen
  • Topic Starter

  • Members
  • 87 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Idaho
  • Local time:10:10 AM

Posted 14 November 2013 - 11:48 PM

Yes, I can and did. Thank you for your help.


"Knowledge is the gathering of useless information."


#13 nasdaq

nasdaq

  • Malware Response Team
  • 40,169 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:10 AM

Posted 15 November 2013 - 08:41 AM

Glad we could help.

#14 nasdaq

nasdaq

  • Malware Response Team
  • 40,169 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:10 AM

Posted 15 November 2013 - 08:41 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users