Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with Trojan Zekos & Plays Random audio Commercials in background


  • This topic is locked This topic is locked
27 replies to this topic

#1 Stinkyweed

Stinkyweed

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 18 January 2014 - 11:51 AM

Randomly Plays audio commercials in the background. Very slow bogged down running pc.

 

DDS (Ver_2012-11-20.01) - NTFS_x86 
Internet Explorer: 8.0.6001.19088  BrowserJavaVersion: 10.45.2
Run by owner at 10:29:57 on 2014-01-18
#Option MBR scan  is disabled.
Microsoft® Windows Vista™ Home Premium   6.0.6001.1.1252.1.1033.18.3002.1636 [GMT -6:00]
.
AV: Trend Micro AntiVirus *Disabled/Outdated* {48929DFC-7A52-A34F-8351-C4DBEDBD9C50}
SP: Trend Micro AntiVirus *Disabled/Outdated* {F3F37C18-5C68-ACC1-B9E1-FFA9963AD6ED}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\Program Files\Common Files\LightScribe\LSSrvc.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Program Files\SMINST\BLService.exe
C:\Program Files\CyberLink\Shared files\RichVideo.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\Yahoo!\SoftwareUpdate\YahooAUService.exe
C:\Program Files\Trend Micro\BM\TMBMSRV.exe
C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe
C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\HP\QuickPlay\QPService.exe
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe
C:\Windows\System32\igfxpers.exe
C:\Windows\System32\igfxtray.exe
C:\Program Files\Adobe\Reader 9.0\Reader\reader_sl.exe
C:\Windows\ehome\ehtray.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\ehome\ehmsas.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Hewlett-Packard\HP wireless Assistant\WiFiMsg.EXE
C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\Com4QLBEx.exe
C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe
C:\Windows\system32\taskeng.exe
C:\Users\owner\AppData\Local\Arcadesafari\ArcadesafariUpdater.exe
C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\servicing\TrustedInstaller.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.yahoo.com/?fr=fp-yie8
mStart Page = hxxp://www.google.com
BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - <orphaned>
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Dogpile Bundle Toolbar BHO: {BFE4B5CB-63F7-4A51-9266-6167655D5B4F} - c:\program files\dogpile bundle toolbar\Toolbar.dll
BHO: Microsoft Live Search Toolbar Helper: {d2ce3e00-f94a-4740-988e-03dc2f38c34f} - c:\program files\msn\toolbar\3.0.0541.0\msneshellx.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
BHO: SingleInstance Class: {FDAD4DA1-61A2-4FD8-9C17-86F7AC245081} - c:\program files\yahoo!\companion\installs\cpn2\YTSingleInstance.dll
TB: Dogpile Bundle Toolbar: {C80BDEB2-8735-44C6-BD55-A1CCD555667A} - c:\program files\dogpile bundle toolbar\Toolbar.dll
TB: Microsoft Live Search Toolbar: {1E61ED7C-7CB8-49d6-B9E9-AB4C880C8414} - c:\program files\msn\toolbar\3.0.0541.0\msneshellx.dll
TB: Dogpile Bundle Toolbar: {C80BDEB2-8735-44C6-BD55-A1CCD555667A} - c:\program files\dogpile bundle toolbar\Toolbar.dll
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
mRun: [SynTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exe
mRun: [hpWirelessAssistant] c:\program files\hewlett-packard\hp wireless assistant\HPWAMain.exe
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [QPService] "c:\program files\hp\quickplay\QPService.exe"
mRun: [QlbCtrl.exe] c:\program files\hewlett-packard\hp quick launch buttons\QlbCtrl.exe /Start
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: E&xport to Microsoft Excel - c:\progra~1\micros~3\office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\google\google toolbar\component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {F47C1DB5-ED21-4dc1-853E-D1495792D4C5} - c:\program files\bodog poker\BPGame.exe
TCP: NameServer = 97.64.183.164 97.64.209.37
TCP: Interfaces\{41B87B3D-F20E-4659-8C96-950DB7EC997E} : DHCPNameServer = 97.64.183.164 97.64.209.37
TCP: Interfaces\{B1EE4DE1-7259-4168-B3F2-0D76BC281003} : DHCPNameServer = 192.168.42.129
TCP: Interfaces\{BEB98FF1-F358-4C94-B64B-FD9AC353B877} : DHCPNameServer = 172.26.38.1 172.26.38.2
Notify: igfxcui - igfxdev.dll
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
mASetup: {10880D85-AAD9-4558-ABDC-2AB1552D831F} - "c:\program files\common files\lightscribe\LSRunOnce.exe"
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\32.0.1700.76\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
mASetup: {A509B1FF-37FF-4bFF-8CFF-4F3A747040FF} - c:\windows\system32\rundll32.exe c:\windows\system32\advpack.dll,launchinfsectionex c:\program files\internet explorer\clrtour.inf,DefaultInstall.ResetTour,,12
.
============= SERVICES / DRIVERS ===============
.
R2 MBAMScheduler;MBAMScheduler;c:\program files\malwarebytes' anti-malware\mbamscheduler.exe [2014-1-17 418376]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2014-1-17 701512]
R2 Recovery Service for Windows;Recovery Service for Windows;c:\program files\sminst\BLService.exe [2008-10-23 365952]
R2 tmevtmgr;tmevtmgr;c:\windows\system32\drivers\tmevtmgr.sys [2007-12-16 52624]
R2 tmpreflt;tmpreflt;c:\windows\system32\drivers\tmpreflt.sys [2007-12-16 36368]
R3 Com4QLBEx;Com4QLBEx;c:\program files\hewlett-packard\hp quick launch buttons\Com4QLBEx.exe [2008-10-23 193840]
R3 IntcHdmiAddService;Intel® High Definition Audio HDMI;c:\windows\system32\drivers\IntcHdmi.sys [2008-6-29 112128]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2014-1-17 22856]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S3 GamesAppService;GamesAppService;c:\program files\wildtangent games\app\GamesAppService.exe [2010-10-12 206072]
S3 mbamchameleon;mbamchameleon;c:\windows\system32\drivers\mbamchameleon.sys [2014-1-18 74456]
S3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\MBAMSwissArmy.sys [2014-1-18 104664]
S3 Revoflt;Revoflt;c:\windows\system32\drivers\revoflt.sys [2014-1-17 27192]
S3 tmproxy;Trend Micro Proxy Service;c:\program files\trend micro\internet security\TmProxy.exe [2010-1-22 648456]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2010-3-18 753504]
S3 WSDScan;WSD Scan Support via UMB;c:\windows\system32\drivers\WSDScan.sys [2008-1-20 19968]
.
=============== Created Last 30 ================
.
2014-01-18 15:03:43 -------- d-----w- c:\programdata\Doctor Web
2014-01-18 15:02:02 -------- d-----w- c:\users\owner\Doctor Web
2014-01-18 10:26:36 -------- d-----w- C:\FRST
2014-01-18 08:55:48 -------- d-----w- c:\programdata\Malwarebytes' Anti-Malware (portable)
2014-01-18 08:55:46 104664 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-01-18 08:50:37 74456 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-01-18 03:24:57 -------- d-----w- C:\SUPERDelete
2014-01-18 03:01:46 -------- d-----w- c:\users\owner\appdata\roaming\SUPERAntiSpyware.com
2014-01-18 03:00:50 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2014-01-18 03:00:50 -------- d-----w- c:\program files\SUPERAntiSpyware
2014-01-18 01:54:35 -------- d-----w- C:\IObit
2014-01-18 01:52:55 -------- d-----w- c:\programdata\ProductData
2014-01-18 01:52:50 -------- d-----w- c:\programdata\{3C5CBD7B-3D1D-411E-96C2-513FFCA84D2D}
2014-01-18 01:52:49 -------- d-----w- c:\programdata\IObit
2014-01-18 01:52:48 -------- d-----w- c:\users\owner\appdata\roaming\IObit
2014-01-18 01:52:41 -------- d-----w- c:\program files\IObit
2014-01-18 01:30:08 -------- d-----w- c:\program files\RegTweaker
2014-01-18 00:13:04 -------- d-----w- c:\users\owner\appdata\local\temp
2014-01-17 23:55:13 -------- d-----w- C:\ComboFix
2014-01-17 21:00:51 -------- d-sh--w- C:\$RECYCLE.BIN
2014-01-17 20:11:41 256000 ----a-w- c:\windows\PEV.exe
2014-01-17 20:11:41 208896 ----a-w- c:\windows\MBR.exe
2014-01-17 20:11:40 98816 ----a-w- c:\windows\sed.exe
2014-01-17 19:56:13 230048 ------w- c:\windows\system32\MpSigStub.exe
2014-01-17 19:13:59 -------- d-----w- c:\users\owner\{4480fe11-4dd1-4bbf-a478-8c91cbbd3a82}
2014-01-17 19:13:40 -------- d-----w- c:\users\owner\{cc5720af-b91f-43a3-bbc7-8bbd33686919}
2014-01-17 19:08:44 -------- d-----w- c:\windows\system32\MRT
2014-01-17 19:08:30 -------- d-----w- c:\users\owner\{e3e52ca4-11f8-4a38-9216-dff5c1e60fe5}
2014-01-17 19:07:29 -------- d-----w- c:\windows\pss
2014-01-17 18:02:47 -------- d-----w- c:\users\owner\appdata\roaming\Malwarebytes
2014-01-17 18:02:07 -------- d-----w- c:\programdata\Malwarebytes
2014-01-17 18:02:06 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-01-17 18:02:06 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2014-01-17 17:54:51 -------- d-----w- c:\users\owner\appdata\local\VS Revo Group
2014-01-17 17:54:43 27192 ----a-w- c:\windows\system32\drivers\revoflt.sys
2014-01-17 17:54:43 -------- d-----w- c:\programdata\VS Revo Group
2014-01-17 17:54:41 -------- d-----w- c:\program files\VS Revo Group
.
==================== Find3M  ====================
.
2013-12-10 19:54:22 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-12-10 19:54:22 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-11-29 18:35:02 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
.
============= FINISH: 10:39:31.65 ===============
 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:55 PM

Posted 19 January 2014 - 08:03 AM


Hello Stinkyweed

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 19 January 2014 - 12:32 PM

# AdwCleaner v3.017 - Report created 19/01/2014 at 11:15:07
# Updated 12/01/2014 by Xplode
# Operating System : Windows Vista ™ Home Premium Service Pack 1 (32 bits)
# Username : owner - OWNER-PC
# Running from : C:\Users\owner\Desktop\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\ProgramData\apn
Folder Deleted : C:\ProgramData\Conduit
Folder Deleted : C:\ProgramData\Trymedia
Folder Deleted : C:\Program Files\Ask.com
Folder Deleted : C:\Program Files\Conduit
Folder Deleted : C:\Program Files\Dogpile Bundle Toolbar
Folder Deleted : C:\Program Files\DomaIQ Uninstaller
Folder Deleted : C:\Program Files\MyPC Backup
Folder Deleted : C:\Program Files\PlaySushi
Folder Deleted : C:\Program Files\Trymedia
Folder Deleted : C:\Program Files\tuguu sl
Folder Deleted : C:\Program Files\Video Performer
Folder Deleted : C:\Program Files\Common Files\FreeCause
Folder Deleted : C:\Windows\installer\{86d4b82a-abed-442a-be86-96357b70f4fe}
Folder Deleted : C:\Users\owner\AppData\Local\Conduit
Folder Deleted : C:\Users\owner\AppData\Local\NativeMessaging
Folder Deleted : C:\Users\owner\AppData\Local\Supreme Savings
Folder Deleted : C:\Users\owner\AppData\LocalLow\AskToolbar
Folder Deleted : C:\Users\owner\AppData\LocalLow\Conduit
Folder Deleted : C:\Users\owner\AppData\LocalLow\FunWebProducts
Folder Deleted : C:\Users\owner\AppData\LocalLow\MyWebSearch
Folder Deleted : C:\Users\owner\AppData\LocalLow\PriceGong
Folder Deleted : C:\Users\owner\AppData\Roaming\PerformerSoft
Folder Deleted : C:\Users\owner\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Dogpile Bundle Toolbar
Folder Deleted : C:\Users\owner\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Video Performer
File Deleted : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eBay.lnk
File Deleted : C:\Windows\System32\Tasks\Scheduled Update for Ask Toolbar
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [m3ffxtbr@mywebsearch.com]
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{6A17D6F8-AF8C-4DE0-93B3-71BD04BDF6BF}
[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{6A17D6F8-AF8C-4DE0-93B3-71BD04BDF6BF}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\conduit.com
Key Deleted : HKLM\SOFTWARE\Classes\AppID\dca-bho.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\GenericAskToolbar.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\PSText.DLL
Key Deleted : HKLM\SOFTWARE\Classes\FreeCauseURLSearchHook.FCToolbarURLSearchHook
Key Deleted : HKLM\SOFTWARE\Classes\FreeCauseURLSearchHook.FCToolbarURLSearchHook.1
Key Deleted : HKLM\SOFTWARE\Classes\MyWebSearch.ThirdPartyInstaller
Key Deleted : HKLM\SOFTWARE\Classes\MyWebSearch.ThirdPartyInstaller.1
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\RunDll32Policy\f3ScrCtr.dll
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows Media\Wmsdk\Sources [F3PopularScreenSavers]
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\post platform [FunWebProducts]
Key Deleted : HKLM\SOFTWARE\Classes\FCTB000060231.FCTB000060231Pos
Key Deleted : HKLM\SOFTWARE\Classes\FCTB000060231.FCTB000060231Pos.1
Key Deleted : HKLM\SOFTWARE\Classes\FCTB000060231.IEToolbar
Key Deleted : HKLM\SOFTWARE\Classes\FCTB000060231.IEToolbar.1
Key Deleted : HKLM\SOFTWARE\Classes\FCTB000060231.IEToolbar.3
Key Deleted : HKLM\SOFTWARE\Classes\FCTB000060231.JSOptionsImpl
Key Deleted : HKLM\SOFTWARE\Classes\FCTB000060231.JSOptionsImpl.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar.CT3279411
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9B0CB95C-933A-4B8C-B6D4-EDCD19A43874}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{DD7C44CC-0F60-4FD9-A38F-5CF30D698AC2}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{E89A07B5-BD7A-43F9-BDA4-0DAA48AC4FA5}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{00000000-6E41-4FD3-8538-502F5495E5FC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{058F0E48-61CA-4964-9FBA-1978A1BB060D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{08858AF6-42AD-4914-95D2-AC3AB0DC8E28}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{18F33C35-8EF2-40D7-8BA4-932B0121B472}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1E0DE227-5CE4-4EA3-AB0C-8B03E1AA76BC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{22222222-2222-2222-2222-220122992262}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3C471948-F874-49F5-B338-4F214A2EE0B1}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{761F6A83-F007-49E4-8EAC-CDB6808EF06F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{799391D3-EB86-4BAC-9BD3-CBFEA58A0E15}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{819FFE22-35C7-4925-8CDA-4E0E2DB94302}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{97D69524-BB57-4185-9C7F-5F05593B771A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{AF175732-0D59-716D-F757-9F1492D808D9}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{BFE4B5CB-63F7-4A51-9266-6167655D5B4F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{C80BDEB2-8735-44C6-BD55-A1CCD555667A}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D858DAFC-9573-4811-B323-7011A3AA7E61}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F78BF7A8-CF12-4DE7-A6DA-C463D1B539A7}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{01947140-417F-46B6-8751-A3A2B8345E1A}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{07B18EAC-A523-4961-B6BB-170DE4475CCA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1093995A-BA37-41D2-836E-091067C4AD17}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{120927BF-1700-43BC-810F-FAB92549B390}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{17DE5E5E-BFE3-4E83-8E1F-8755795359EC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1F52A5FA-A705-4415-B975-88503B291728}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{247A115F-06C2-4FB3-967D-2D62D3CF4F0A}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2E3537FC-CF2F-4F56-AF54-5A6A3DD375CC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2E9937FC-CF2F-4F56-AF54-5A6A3DD375CC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3E1656ED-F60E-4597-B6AA-B6A58E171495}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3E53E2CB-86DB-4A4A-8BD9-FFEB7A64DF82}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3E720451-B472-4954-B7AA-33069EB53906}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3E720453-B472-4954-B7AA-33069EB53906}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{45A8F904-D9CA-439B-9CBB-11097B45D9E1}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{5272CCD4-4199-4B04-BF68-B28A0DCF0151}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{63D0ED2B-B45B-4458-8B3B-60C69BBBD83C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{63D0ED2D-B45B-4458-8B3B-60C69BBBD83C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6C434537-053E-486D-B62A-160059D9D456}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6E74766C-4D93-4CC0-96D1-47B8E07FF9CA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{72EE7F04-15BD-4845-A005-D6711144D86A}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{741DE825-A6F0-4497-9AA6-8023CF9B0FFF}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7473D291-B7BB-4F24-AE82-7E2CE94BB6A9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7473D293-B7BB-4F24-AE82-7E2CE94BB6A9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7473D295-B7BB-4F24-AE82-7E2CE94BB6A9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7473D297-B7BB-4F24-AE82-7E2CE94BB6A9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{819FFE21-35C7-4925-8CDA-4E0E2DB94302}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8E9CF769-3D3B-40EB-9E2D-76E7A205E4D2}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{90449521-D834-4703-BB4E-D3AA44042FF8}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{91CF619A-4686-4CA4-9232-3B2E6B63AA92}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{991AAC62-B100-47CE-8B75-253965244F69}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A626CDBD-3D13-4F78-B819-440A28D7E8FC}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{AC71B60E-94C9-4EDE-BA46-E146747BB67E}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BBABDC90-F3D5-4801-863A-EE6AE529862D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{CF54BE1C-9359-4395-8533-1657CF209CFE}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D6FF3684-AD3B-48EB-BBB4-B9E6C5A355C1}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DB507187-9746-458C-97DA-C458131EEDE7}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DE38C398-B328-4F4C-A3AD-1B5E4ED93477}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25E}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E342AF55-B78A-4CD0-A2BB-DA7F52D9D25F}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E79DFBC9-5697-4FBD-94E5-5B2A9C7C1612}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E79DFBCB-5697-4FBD-94E5-5B2A9C7C1612}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{EB9E5C1C-B1F9-4C2B-BE8A-27D6446FDAF8}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F165085B-6B85-4AD5-AD00-95552A823F6D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F87D7FB5-9DC5-4C8C-B998-D8DFE02E2978}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{66666666-6666-6666-6666-660166996662}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{819FFE20-35C7-4925-8CDA-4E0E2DB94302}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{8FFDF636-0D87-4B33-B9E9-79A53F6E1DAE}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D518921A-4A03-425E-9873-B9A71756821E}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E47CAEE0-DEEA-464A-9326-3F2801535A4D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{F42228FB-E84E-479E-B922-FBBD096E792C}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BFE4B5CB-63F7-4A51-9266-6167655D5B4F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00000000-6E41-4FD3-8538-502F5495E5FC}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{BFE4B5CB-63F7-4A51-9266-6167655D5B4F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{C80BDEB2-8735-44C6-BD55-A1CCD555667A}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{BFE4B5CB-63F7-4A51-9266-6167655D5B4F}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{C80BDEB2-8735-44C6-BD55-A1CCD555667A}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{08858AF6-42AD-4914-95D2-AC3AB0DC8E28}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{31111111-1111-1111-1111-110111991162}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{A5AA24EA-11B8-4113-95AE-9ED71DEAF12A}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{171DEBEB-C3D4-40B7-AC73-056A5EBA4A7E}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{EEE6C360-6118-11DC-9C72-001320C79847}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{EEE6C360-6118-11DC-9C72-001320C79847}
Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{C80BDEB2-8735-44C6-BD55-A1CCD555667A}]
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{C80BDEB2-8735-44C6-BD55-A1CCD555667A}]
Key Deleted : HKCU\Software\APN PIP
Key Deleted : HKCU\Software\Ask.com
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\performersoft llc
Key Deleted : HKCU\Software\tuguu sl
Key Deleted : HKCU\Software\YahooPartnerToolbar
Key Deleted : HKCU\Software\AppDataLow\AskToolbarInfo
Key Deleted : HKCU\Software\AppDataLow\PlaySushi
Key Deleted : HKCU\Software\AppDataLow\Toolbar
Key Deleted : HKCU\Software\AppDataLow\Software\AskToolbar
Key Deleted : HKCU\Software\AppDataLow\Software\Compete
Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
Key Deleted : HKCU\Software\AppDataLow\Software\ConduitSearchScopes
Key Deleted : HKCU\Software\AppDataLow\Software\Freecause
Key Deleted : HKCU\Software\AppDataLow\Software\Fun Web Products
Key Deleted : HKCU\Software\AppDataLow\Software\FunWebProducts
Key Deleted : HKCU\Software\AppDataLow\Software\MyWebSearch
Key Deleted : HKCU\Software\AppDataLow\Software\PriceGong
Key Deleted : HKCU\Software\AppDataLow\Software\SmartBar
Key Deleted : HKLM\Software\Conduit
Key Deleted : HKLM\Software\PIP
Key Deleted : HKLM\Software\Supreme Savings
Key Deleted : HKLM\Software\Trymedia Systems
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{86D4B82A-ABED-442A-BE86-96357B70F4FE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{EBE677C0-CBCB-4EBF-8098-E27E1B5271CF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{86D4B82A-ABED-442A-BE86-96357B70F4FE}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{EBE677C0-CBCB-4EBF-8098-E27E1B5271CF}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\MyPC Backup
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\mywebsearch bar uninstall
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\PlaySushi
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0C776EBEBCBCFBE408892EE7B12517FC
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\261F213D1F55267499B1F87D0CC3BCF7
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\741B4ADF27276464790022C965AB6DA8
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\7DE196B10195F5647A2B21B761F3DE01
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\9D4F5849367142E4685ED8C25E44C5ED
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A5875B04372C19545BEB90D4D606C472
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\A876D9E80B896EC44A8620248CC79296
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\B66FFAB725B92594C986DE826A867888
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\0C776EBEBCBCFBE408892EE7B12517FC
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Classes\Installer\Features\0C776EBEBCBCFBE408892EE7B12517FC
Key Deleted : HKLM\Software\Classes\Installer\Features\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Classes\Installer\Products\0C776EBEBCBCFBE408892EE7B12517FC
Key Deleted : HKLM\Software\Classes\Installer\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\F928123A039649549966D4C29D35B1C9
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v8.0.6001.19088
 
 
-\\ Google Chrome v32.0.1700.76
 
[ File : C:\Users\owner\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
Deleted : homepage
 
*************************
 
AdwCleaner[R0].txt - [15858 octets] - [19/01/2014 11:12:35]
AdwCleaner[S0].txt - [16096 octets] - [19/01/2014 11:15:07]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [16157 octets] ##########
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.0 (01.07.2014:1)
OS: Windows Vista ™ Home Premium x86
Ran by owner on Sun 01/19/2014 at 11:24:51.11
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\vafplayer
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\InternetRegistry\REGISTRY\USER\S-1-5-21-3821196512-1277389862-17254363-1000\Software\sweetim
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Classes\installer\upgradecodes\f928123a039649549966d4c29d35b1c9
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\domaiq uninstaller
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{362269bd-c93c-460f-9255-3bd667eb7f0a}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{64E1A435-FED4-4941-A70F-385BB6B8986E}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{7E6C91DF-2F7E-42A8-857B-0CA50A3BB79D}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{362269bd-c93c-460f-9255-3bd667eb7f0a}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{6A28AFCB-D7B6-4628-8EA2-D66964A22F01}
Successfully deleted: [Registry Key] "hkey_current_user\software\microsoft\internet explorer\low rights\elevationpolicy\{a5aa24ea-11b8-4113-95ae-9ed71deaf12a}"
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] C:\Users\owner\AppData\LocalLow\FCTB000060231
Successfully deleted: [Folder] "C:\Users\owner\appdata\local\cre"
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sun 01/19/2014 at 11:29:24.59
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
It is still running commercials in the background. Audio commercials. Gringo i do appreciate you taking the time to help me. 


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:55 PM

Posted 19 January 2014 - 01:05 PM


Hello Stinkyweed

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 19 January 2014 - 01:17 PM

It froze up so i have to restart :( i hope that didnt mess anything up.

 

Running Combofix now :) 


Edited by Stinkyweed, 19 January 2014 - 01:49 PM.


#6 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 19 January 2014 - 01:59 PM

Still playing the commercials in the background :(

 

 

ComboFix 14-01-16.03 - owner 01/19/2014  12:40:44.2.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6001.1.1252.1.1033.18.3002.1830 [GMT -6:00]
Running from: c:\users\owner\Desktop\ComboFix.exe
AV: Trend Micro AntiVirus *Disabled/Outdated* {48929DFC-7A52-A34F-8351-C4DBEDBD9C50}
SP: Trend Micro AntiVirus *Disabled/Outdated* {F3F37C18-5C68-ACC1-B9E1-FFA9963AD6ED}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2013-12-19 to 2014-01-19  )))))))))))))))))))))))))))))))
.
.
2014-01-19 18:53 . 2014-01-19 18:53 -------- d-----w- c:\windows\system32\config\systemprofile\AppData\Local\temp
2014-01-19 18:53 . 2014-01-19 18:53 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-01-19 17:24 . 2014-01-19 17:24 -------- d-----w- c:\windows\ERUNT
2014-01-19 17:12 . 2014-01-19 17:15 -------- d-----w- C:\AdwCleaner
2014-01-18 16:42 . 2013-12-16 07:54 7760024 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{22ECF944-05B7-4540-B8BE-B5E829852169}\mpengine.dll
2014-01-18 15:03 . 2014-01-18 15:04 -------- d-----w- c:\programdata\Doctor Web
2014-01-18 15:02 . 2014-01-18 15:15 -------- d-----w- c:\users\owner\Doctor Web
2014-01-18 10:26 . 2014-01-18 10:26 -------- d-----w- C:\FRST
2014-01-18 08:55 . 2014-01-18 09:17 -------- d-----w- c:\programdata\Malwarebytes' Anti-Malware (portable)
2014-01-18 08:55 . 2014-01-18 08:55 104664 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-01-18 08:50 . 2014-01-18 08:53 74456 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-01-18 03:24 . 2014-01-18 03:24 -------- d-----w- C:\SUPERDelete
2014-01-18 03:01 . 2014-01-18 03:01 -------- d-----w- c:\users\owner\AppData\Roaming\SUPERAntiSpyware.com
2014-01-18 03:00 . 2014-01-18 03:04 -------- d-----w- c:\program files\SUPERAntiSpyware
2014-01-18 03:00 . 2014-01-18 03:00 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2014-01-18 01:54 . 2014-01-18 01:54 -------- d-----w- C:\IObit
2014-01-18 01:52 . 2014-01-18 01:52 -------- d-----w- c:\programdata\ProductData
2014-01-18 01:52 . 2014-01-18 01:52 -------- d-----w- c:\programdata\{3C5CBD7B-3D1D-411E-96C2-513FFCA84D2D}
2014-01-18 01:52 . 2014-01-18 01:52 -------- d-----w- c:\programdata\IObit
2014-01-18 01:52 . 2014-01-18 01:52 -------- d-----w- c:\users\owner\AppData\Roaming\IObit
2014-01-18 01:52 . 2014-01-18 01:52 -------- d-----w- c:\program files\IObit
2014-01-18 01:30 . 2014-01-18 01:30 -------- d-----w- c:\program files\RegTweaker
2014-01-18 00:13 . 2014-01-19 18:53 -------- d-----w- c:\users\owner\AppData\Local\temp
2014-01-17 19:56 . 2013-11-26 18:25 230048 ------w- c:\windows\system32\MpSigStub.exe
2014-01-17 19:13 . 2014-01-18 10:43 -------- d-----w- c:\users\owner\{4480fe11-4dd1-4bbf-a478-8c91cbbd3a82}
2014-01-17 19:13 . 2014-01-18 10:43 -------- d-----w- c:\users\owner\{cc5720af-b91f-43a3-bbc7-8bbd33686919}
2014-01-17 19:08 . 2014-01-17 19:13 -------- d-----w- c:\windows\system32\MRT
2014-01-17 19:08 . 2014-01-18 10:43 -------- d-----w- c:\users\owner\{e3e52ca4-11f8-4a38-9216-dff5c1e60fe5}
2014-01-17 18:02 . 2014-01-17 18:02 -------- d-----w- c:\users\owner\AppData\Roaming\Malwarebytes
2014-01-17 18:02 . 2014-01-17 18:02 -------- d-----w- c:\programdata\Malwarebytes
2014-01-17 18:02 . 2014-01-17 18:02 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2014-01-17 18:02 . 2013-04-04 20:50 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-01-17 17:54 . 2014-01-17 17:54 -------- d-----w- c:\users\owner\AppData\Local\VS Revo Group
2014-01-17 17:54 . 2014-01-17 17:54 -------- d-----w- c:\programdata\VS Revo Group
2014-01-17 17:54 . 2009-12-30 16:21 27192 ----a-w- c:\windows\system32\drivers\revoflt.sys
2014-01-17 17:54 . 2014-01-17 17:54 -------- d-----w- c:\program files\VS Revo Group
2014-01-05 10:31 . 2014-01-05 10:31 -------- d-----w- c:\programdata\WindowsSearch
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-12-10 19:54 . 2012-03-30 19:59 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-12-10 19:54 . 2011-06-18 07:09 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-11-29 18:35 . 2013-11-29 18:35 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[7] 2009-04-11 . 3B5B4D53FEC14F7476CA29A20CC31AC9 . 550400 . . [6.0.6002.18005] . . c:\windows\SoftwareDistribution\Download\cde11068f5b77b180111333ef9781925\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6002.18005_none_6bb655083b01c988\rpcss.dll
[-] 2009-03-03 . 789CEB929AEBDB76E5C649F7C35D21B9 . 551424 . . [6.0.6000.16386] . . c:\windows\System32\rpcss.dll
[-] 2009-03-03 04:39 . !HASH: COULD NOT OPEN FILE !!!!! . 551424 . . [------] . . c:\windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6001.18226_none_69bb41ac3deac876\rpcss.dll
[7] 2009-03-03 . 4DFCBDEF3CCAA98F99038DED78945253 . 551424 . . [6.0.6001.22389] . . c:\windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6001.22389_none_6a06ffcd57365beb\rpcss.dll
[7] 2009-03-03 . 7B981222A257D076885BFFB66F19B7CE . 549888 . . [6.0.6000.16830] . . c:\windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6000.16830_none_67c4315e40d1bb6c\rpcss.dll
[7] 2009-03-03 . B1BB45E24717A7F790B4411C4446EF5E . 550400 . . [6.0.6000.21023] . . c:\windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6000.21023_none_685b771559e4be8c\rpcss.dll
[7] 2008-01-21 . 33FB1F0193EE2051067441492D56113C . 547328 . . [6.0.6001.18000] . . c:\windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6001.18000_none_69cadbfc3ddffe3c\rpcss.dll
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"ehTray.exe"="c:\windows\ehome\ehTray.exe" [2008-01-21 125952]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-04-17 1049896]
"hpWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2008-04-15 488752]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
"QPService"="c:\program files\HP\QuickPlay\QPService.exe" [2008-09-24 468264]
"QlbCtrl.exe"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2008-08-01 202032]
"Persistence"="c:\windows\system32\igfxpers.exe" [2010-08-26 170520]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2010-08-26 136216]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKLM\~\startupfolder\C:^Users^owner^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
path=c:\users\owner\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OneNote 2007 Screen Clipper and Launcher.lnk
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\DW7]
2011-12-12 18:12 10448384 ----a-w- c:\program files\The Weather Channel\The Weather Channel App\TWCApp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HotKeysCmds]
2010-08-26 01:45 171032 ----a-w- c:\windows\System32\hkcmd.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Health Check Scheduler]
2008-10-09 14:58 75008 ----a-w- c:\program files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\HP Software Update]
2011-05-10 07:41 49208 ----a-w- c:\program files\HP\HP Software Update\hpwuschd2.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LightScribe Control Panel]
2008-06-09 18:16 2363392 ----a-w- c:\program files\Common Files\LightScribe\LightScribeControlPanel.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2012-10-25 09:12 421888 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SBC_McciTrayApp]
2007-02-28 19:35 1011200 ----a-w- c:\program files\SBC\update\SST.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Search Protection]
2009-02-03 13:15 111856 ----a-w- c:\program files\Yahoo!\Search Protection\SearchProtection.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UCam_Menu]
2007-12-24 23:55 222504 ------w- c:\program files\CyberLink\YouCam\MUITransfer\MUIStartMenu.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UfSeAgnt.exe]
2008-07-29 22:57 1398024 ----a-w- c:\program files\Trend Micro\Internet Security\UfSeAgnt.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdateLBPShortCut]
2008-06-14 01:11 210216 ------w- c:\program files\CyberLink\LabelPrint\MUITransfer\MUIStartMenu.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdateP2GoShortCut]
2008-06-14 01:11 210216 ------w- c:\program files\CyberLink\Power2Go\MUITransfer\MUIStartMenu.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdatePDIRShortCut]
2008-06-14 01:11 210216 ------w- c:\program files\CyberLink\PowerDirector\MUITransfer\MUIStartMenu.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\UpdatePSTShortCut]
2008-10-07 03:42 210216 ------w- c:\program files\CyberLink\DVD Suite\MUITransfer\MUIStartMenu.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\YSearchProtection]
2009-02-03 13:15 111856 ----a-w- c:\program files\Yahoo!\Search Protection\SearchProtection.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Svc\S-1-5-21-3821196512-1277389862-17254363-1000]
"EnableNotificationsRef"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]
2008-06-09 18:14 451872 ----a-w- c:\program files\Common Files\LightScribe\LSRunOnce.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-01-18 14:11 1211672 ----a-w- c:\program files\Google\Chrome\Application\32.0.1700.76\Installer\chrmstp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-03-08 11:32 128512 ----a-w- c:\windows\System32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder
.
2014-01-19 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-03-30 19:54]
.
2014-01-18 c:\windows\Tasks\Arcadesafari.job
- c:\users\owner\AppData\Local\Arcadesafari\ArcadesafariUpdater.exe [2013-04-08 22:19]
.
2014-01-19 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-23 23:04]
.
2014-01-19 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2011-01-23 23:04]
.
2014-01-19 c:\windows\Tasks\HPCeeScheduleForowner.job
- c:\program files\hewlett-packard\sdp\ceement\HPCEE.exe [2008-10-23 18:34]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.yahoo.com/?fr=fp-yie8
mStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office12\EXCEL.EXE/3000
IE: Google Sidewiki... - c:\program files\Google\Google Toolbar\Component\GoogleToolbarDynamic_mui_en_D183CA64F05FDD98.dll/cmsidewiki.html
TCP: DhcpNameServer = 97.64.183.164 97.64.209.37
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-Dogpile Bundle Toolbar - c:\program files\Dogpile Bundle Toolbar\Uninst.exe
AddRemove-Video Performer - c:\program files\Video Performer\uninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-01-19 12:53
Windows 6.0.6001 Service Pack 1 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ... 
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_9_900_170_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_11_9_900_170_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2014-01-19  12:56:55
ComboFix-quarantined-files.txt  2014-01-19 18:56
ComboFix2.txt  2014-01-18 00:13
ComboFix3.txt  2014-01-17 21:13
.
Pre-Run: 218,225,987,584 bytes free
Post-Run: 218,532,405,248 bytes free
.
- - End Of File - - AB951DB2AEF4F8E2CE740CCCD19A3D35
588AE8F0C685C02BA11F30D9CD7E61A0
 
 
 
 
Still running slow and playing commercials in the background still. :( 

Edited by Stinkyweed, 19 January 2014 - 11:15 PM.


#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:55 PM

Posted 20 January 2014 - 12:45 AM





Hello Stinkyweed,

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit
2.Unzip the contents to a folder in a convenient location.
3.Open the folder where the contents were unzipped and run mbar.exe
4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
6.Wait while the system shuts down and the cleanup process is performed.
7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
  • •Internet access
    •Windows Update
    •Windows Firewall
9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
10.Verify that your system is now functioning normally.


--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from MBAR and Roguekiller and also let me know how the computer is doing at this time.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 20 January 2014 - 02:12 AM

---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.07.0.1008
 
© Malwarebytes Corporation 2011-2012
 
OS version: 6.0.6001 Windows Vista Service Pack 1 x86
 
Account is Administrative
 
Internet Explorer version: 8.0.6001.19088
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 1.995000 GHz
Memory total: 3148292096, free: 2380431360
 
Could not load protection driver
Initializing...
======================
------------ Kernel report ------------
     01/20/2014 00:14:35
------------ Loaded modules -----------
\SystemRoot\system32\ntkrnlpa.exe
\SystemRoot\system32\hal.dll
\SystemRoot\system32\kdcom.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\BOOTVID.dll
\SystemRoot\system32\CLFS.SYS
\SystemRoot\system32\CI.dll
\SystemRoot\System32\drivers\fvfsm.sys
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\acpi.sys
\SystemRoot\system32\drivers\WMILIB.SYS
\SystemRoot\system32\drivers\msisadrv.sys
\SystemRoot\system32\drivers\pci.sys
\SystemRoot\system32\drivers\isapnp.sys
\SystemRoot\system32\drivers\mpio.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\system32\DRIVERS\compbatt.sys
\SystemRoot\system32\DRIVERS\BATTC.SYS
\SystemRoot\system32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\system32\drivers\intelide.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
\SystemRoot\system32\drivers\aliide.sys
\SystemRoot\system32\drivers\amdide.sys
\SystemRoot\system32\drivers\cmdide.sys
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\system32\drivers\msdsm.sys
\SystemRoot\system32\drivers\nvraid.sys
\SystemRoot\system32\drivers\CLASSPNP.SYS
\SystemRoot\system32\drivers\pciide.sys
\SystemRoot\system32\drivers\viaide.sys
\SystemRoot\system32\drivers\iastorv.sys
\SystemRoot\system32\drivers\atapi.sys
\SystemRoot\system32\drivers\ataport.SYS
\SystemRoot\system32\drivers\lsi_scsi.sys
\SystemRoot\system32\drivers\storport.sys
\SystemRoot\system32\drivers\msahci.sys
\SystemRoot\system32\drivers\hpcisss.sys
\SystemRoot\system32\drivers\adp94xx.sys
\SystemRoot\system32\drivers\adpahci.sys
\SystemRoot\system32\drivers\adpu160m.sys
\SystemRoot\system32\drivers\SCSIPORT.SYS
\SystemRoot\system32\drivers\adpu320.sys
\SystemRoot\system32\drivers\djsvs.sys
\SystemRoot\system32\drivers\arc.sys
\SystemRoot\system32\drivers\arcsas.sys
\SystemRoot\system32\drivers\elxstor.sys
\SystemRoot\system32\drivers\i2omp.sys
\SystemRoot\system32\drivers\iirsp.sys
\SystemRoot\system32\drivers\iteatapi.sys
\SystemRoot\system32\drivers\iteraid.sys
\SystemRoot\system32\drivers\lsi_fc.sys
\SystemRoot\system32\drivers\lsi_sas.sys
\SystemRoot\system32\drivers\megasas.sys
\SystemRoot\system32\drivers\megasr.sys
\SystemRoot\system32\drivers\mraid35x.sys
\SystemRoot\system32\drivers\nfrd960.sys
\SystemRoot\system32\drivers\nvstor.sys
\SystemRoot\system32\drivers\ql2300.sys
\SystemRoot\system32\drivers\ql40xx.sys
\SystemRoot\system32\drivers\sisraid2.sys
\SystemRoot\system32\drivers\sisraid4.sys
\SystemRoot\system32\drivers\symc8xx.sys
\SystemRoot\system32\drivers\sym_hi.sys
\SystemRoot\system32\drivers\sym_u3.sys
\SystemRoot\system32\drivers\uliahci.sys
\SystemRoot\system32\drivers\ulsata.sys
\SystemRoot\system32\drivers\ulsata2.sys
\SystemRoot\system32\drivers\vsmraid.sys
\SystemRoot\system32\drivers\fltmgr.sys
\SystemRoot\system32\drivers\fileinfo.sys
\SystemRoot\System32\Drivers\ksecdd.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\msrpc.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\System32\Drivers\Ntfs.sys
\SystemRoot\system32\drivers\wd.sys
\SystemRoot\system32\drivers\volsnap.sys
\SystemRoot\System32\Drivers\spldr.sys
\SystemRoot\system32\drivers\sbp2port.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\System32\drivers\ecache.sys
\SystemRoot\system32\drivers\disk.sys
\SystemRoot\system32\drivers\crcdisk.sys
\SystemRoot\system32\DRIVERS\tunnel.sys
\SystemRoot\system32\DRIVERS\tunmp.sys
\SystemRoot\system32\DRIVERS\intelppm.sys
\SystemRoot\system32\DRIVERS\wmiacpi.sys
\SystemRoot\system32\DRIVERS\igdkmd32.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\system32\DRIVERS\usbuhci.sys
\SystemRoot\system32\DRIVERS\USBPORT.SYS
\SystemRoot\system32\DRIVERS\usbehci.sys
\SystemRoot\system32\DRIVERS\HDAudBus.sys
\SystemRoot\system32\DRIVERS\Rtlh86.sys
\SystemRoot\system32\DRIVERS\athr.sys
\SystemRoot\system32\DRIVERS\i8042prt.sys
\SystemRoot\system32\DRIVERS\HpqKbFiltr.sys
\SystemRoot\system32\DRIVERS\kbdclass.sys
\SystemRoot\system32\DRIVERS\SynTP.sys
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\system32\DRIVERS\mouclass.sys
\SystemRoot\system32\DRIVERS\CmBatt.sys
\SystemRoot\system32\DRIVERS\cdrom.sys
\SystemRoot\system32\DRIVERS\msiscsi.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\system32\DRIVERS\rasl2tp.sys
\SystemRoot\system32\DRIVERS\ndistapi.sys
\SystemRoot\system32\DRIVERS\ndiswan.sys
\SystemRoot\system32\DRIVERS\raspppoe.sys
\SystemRoot\system32\DRIVERS\raspptp.sys
\SystemRoot\system32\DRIVERS\rassstp.sys
\SystemRoot\system32\DRIVERS\termdd.sys
\SystemRoot\system32\DRIVERS\swenum.sys
\SystemRoot\system32\DRIVERS\ks.sys
\SystemRoot\system32\DRIVERS\mssmbios.sys
\SystemRoot\system32\DRIVERS\umbus.sys
\SystemRoot\system32\DRIVERS\usbhub.sys
\SystemRoot\System32\Drivers\NDProxy.SYS
\SystemRoot\system32\drivers\CHDRT32.sys
\SystemRoot\system32\drivers\portcls.sys
\SystemRoot\system32\drivers\drmk.sys
\SystemRoot\system32\DRIVERS\HSXHWAZL.sys
\SystemRoot\system32\DRIVERS\HSX_DPV.sys
\SystemRoot\system32\DRIVERS\HSX_CNXT.sys
\SystemRoot\system32\drivers\modem.sys
\SystemRoot\system32\drivers\IntcHdmi.sys
\SystemRoot\System32\Drivers\Fs_Rec.SYS
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\system32\drivers\HIDPARSE.SYS
\SystemRoot\System32\drivers\vga.sys
\SystemRoot\System32\drivers\VIDEOPRT.SYS
\SystemRoot\System32\DRIVERS\RDPCDD.sys
\SystemRoot\system32\drivers\rdpencdd.sys
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\System32\DRIVERS\rasacd.sys
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\smb.sys
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\drivers\ws2ifsl.sys
\SystemRoot\system32\DRIVERS\pacer.sys
\SystemRoot\system32\DRIVERS\netbios.sys
\SystemRoot\system32\DRIVERS\wanarp.sys
\SystemRoot\system32\DRIVERS\tmtdi.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\drivers\RTSTOR.SYS
\SystemRoot\system32\DRIVERS\usbccgp.sys
\SystemRoot\System32\Drivers\usbvideo.sys
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\Drivers\dump_dumpata.sys
\SystemRoot\System32\Drivers\dump_msahci.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\Dxapi.sys
\SystemRoot\system32\DRIVERS\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\System32\ATMFD.DLL
\SystemRoot\system32\drivers\luafv.sys
\SystemRoot\system32\DRIVERS\tmpreflt.sys
\SystemRoot\system32\DRIVERS\vsapint.sys
\SystemRoot\system32\DRIVERS\tmxpflt.sys
\SystemRoot\system32\DRIVERS\lltdio.sys
\SystemRoot\system32\DRIVERS\nwifi.sys
\SystemRoot\system32\DRIVERS\ndisuio.sys
\SystemRoot\system32\DRIVERS\rspndr.sys
\SystemRoot\system32\drivers\spsys.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\drivers\mrxdav.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\system32\DRIVERS\mdmxsdk.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\Drivers\secdrv.SYS
\SystemRoot\System32\drivers\tcpipreg.sys
\SystemRoot\system32\DRIVERS\tmcomm.sys
\SystemRoot\system32\DRIVERS\tmevtmgr.sys
\SystemRoot\system32\DRIVERS\xaudio.sys
\SystemRoot\system32\DRIVERS\tmactmon.sys
\SystemRoot\system32\DRIVERS\cdfs.sys
\??\C:\Windows\system32\drivers\MBAMSwissArmy.sys
\Windows\System32\ntdll.dll
----------- End -----------
Done!
<<<1>>>
Upper Device Name: \Device\Harddisk0\DR0
Upper Device Object: 0xffffffff85fe30c8
Upper Device Driver Name: \Driver\disk\
Lower Device Name: \Device\Ide\IdeDeviceP0T0L0-0\
Lower Device Object: 0xffffffff85900ba0
Lower Device Driver Name: \Driver\atapi\
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffffff85fe30c8, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
--------- Disk Stack ------
DevicePointer: 0xffffffff860e6cb8, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffffff85fe30c8, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
DevicePointer: 0xffffffff85900ba0, DeviceName: \Device\Ide\IdeDeviceP0T0L0-0\, DriverName: \Driver\atapi\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Done!
Drive 0
Scanning MBR on drive 0...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 678B1560
 
Partition information:
 
    Partition 0 type is Primary (0x7)
    Partition is ACTIVE.
    Partition starts at LBA: 63  Numsec = 602312641
    Partition file system is NTFS
    Partition is bootable
 
    Partition 1 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 602312704  Numsec = 22822912
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
Disk Size: 320072933376 bytes
Sector size: 512 bytes
 
Scanning physical sectors of unpartitioned space on drive 0 (1-62-625122448-625142448)...
Done!
Scan finished
=======================================
 
 
Removal queue found; removal started
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_0_i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\Bootstrap_0_0_63_i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR_0_r.mbam...
Removal finished
 
 
RogueKiller V8.8.2 [Jan 17 2014] by Tigzy
mail : tigzyRK<at>gmail<dot>com
 
Operating System : Windows Vista (6.0.6001 Service Pack 1) 32 bits version
Started in : Normal mode
User : owner [Admin rights]
Mode : Scan -- Date : 01/20/2014 01:03:53
| ARK || FAK || MBR |
 
¤¤¤ Bad processes : 0 ¤¤¤
 
¤¤¤ Registry Entries : 3 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND
 
¤¤¤ Scheduled tasks : 0 ¤¤¤
 
¤¤¤ Startup Entries : 0 ¤¤¤
 
¤¤¤ Web browsers : 0 ¤¤¤
 
¤¤¤ Browser Addons : 0 ¤¤¤
 
¤¤¤ Particular Files / Folders: ¤¤¤
[Root.Zekos][File] rpcss.dll : C:\Windows\System32\rpcss.dll [-] --> FOUND
 
¤¤¤ Driver : [LOADED] ¤¤¤
[Address] SSDT[64] : NtCreateKey @ 0x82028FA5 -> HOOKED (Unknown @ 0x87E30FA0)
[Address] SSDT[72] : NtCreateProcess @ 0x820D572B -> HOOKED (Unknown @ 0x87E301E0)
[Address] SSDT[73] : NtCreateProcessEx @ 0x820D5776 -> HOOKED (Unknown @ 0x87E304A0)
[Address] SSDT[78] : NtCreateThread @ 0x820D5560 -> HOOKED (Unknown @ 0x87E31E00)
[Address] SSDT[123] : NtDeleteKey @ 0x81FF683C -> HOOKED (Unknown @ 0x87E31520)
[Address] SSDT[126] : NtDeleteValueKey @ 0x81FF121F -> HOOKED (Unknown @ 0x87E317E0)
[Address] SSDT[165] : NtLoadDriver @ 0x81FB0AD0 -> HOOKED (Unknown @ 0x87E32140)
[Address] SSDT[194] : NtOpenProcess @ 0x82052EF2 -> HOOKED (Unknown @ 0x87E30A20)
[Address] SSDT[324] : NtSetValueKey @ 0x82029DD1 -> HOOKED (Unknown @ 0x87E31260)
[Address] SSDT[334] : NtTerminateProcess @ 0x820242F0 -> HOOKED (Unknown @ 0x87E30CE0)
[Address] SSDT[358] : NtWriteVirtualMemory @ 0x8204F033 -> HOOKED (Unknown @ 0x87E31C60)
[Address] SSDT[382] : NtCreateThreadEx @ 0x82042F82 -> HOOKED (Unknown @ 0x87E31FA0)
[Address] SSDT[383] : NtCreateUserProcess @ 0x82009E26 -> HOOKED (Unknown @ 0x87E30760)
[Inline] EAT @explorer.exe (FwDoNothingOnObject) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36550C66)
[Inline] EAT @explorer.exe (FwEnableMemTracing) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36550C66)
[Inline] EAT @explorer.exe (FwSetMemLeakPolicy) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36550C66)
 
¤¤¤ External Hives: ¤¤¤
 
¤¤¤ Infection : Root.Zekos ¤¤¤
 
¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts
 
 
127.0.0.1       localhost
 
 
¤¤¤ MBR Check: ¤¤¤
 
+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST9320320AS ATA Device +++++
--- User ---
[MBR] 6e8fa847bb97525c5e29a2c7f3a50bf5
[BSP] d70ba7ca57d24e7090480f3d24fce7fb : Toshiba MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 294097 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 602312704 | Size: 11144 Mo
User = LL1 ... OK!
User = LL2 ... OK!
 
Finished : << RKreport[0]_S_01202014_010353.txt >>
 
 
 
 
Roguekiller did find the Trojan.Zekos and said it needed to reboot to finish the process of removing it and when it restarted it gave me a black screen with a cursor. :( I can't access Windows now or maybe i'm in windows but i just have a black screen and a cursor. I cannot get the report that you wanted from roguekiller because i can no longer access windows. It was saying something about finding a replacement for a file i think Rpcss.DLL
 

Edited by Stinkyweed, 20 January 2014 - 02:25 AM.


#9 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 20 January 2014 - 11:05 AM

Kind of dead in the water at this point. Please Help


Edited by Stinkyweed, 20 January 2014 - 12:13 PM.


#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:55 PM

Posted 20 January 2014 - 08:49 PM


Hello Stinkyweed

download Farbar Recovery Scan Tool and save it to a flash drive.


Plug the flash drive into the infected PC.

Enter System Recovery Options.

To enter System Recovery Options from the Advanced Boot Options:
  • Restart the computer.
  • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
  • Use the arrow keys to select the Repair your computer menu item.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account an click Next.
To enter System Recovery Options by using Windows installation disc:
  • Insert the installation disc.
  • Restart your computer.
  • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
  • Click Repair your computer.
  • Select US as the keyboard language settings, and then click Next.
  • Select the operating system you want to repair, and then click Next.
  • Select your user account and click Next.
On the System Recovery Options menu you will get the following options:

    • Startup Repair
      System Restore
      Windows Complete PC Restore
      Windows Memory Diagnostic Tool
      Command Prompt
  • Select Command Prompt
  • In the command window type in notepad and press Enter.
  • The notepad opens. Under File menu select Open.
  • Select "Computer" and find your flash drive letter and close the notepad.
  • In the command window type e:\frst.exe and press Enter
    Note: Replace letter e with the drive letter of your flash drive.
  • The tool will start to run.
  • When the tool opens click Yes to disclaimer.
  • First Press the Scan button.
  • It will make a log (FRST.txt)
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 20 January 2014 - 09:09 PM

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 19-01-2014 04
Ran by SYSTEM on MINWINPC on 20-01-2014 20:07:20
Running from G:\
Windows Vista ™ Home Premium (X86) OS Language: English(US)
Internet Explorer Version 8
Boot Mode: Recovery
 
The current controlset is ControlSet001
ATTENTION!:=====> If the system is bootable FRST could be run from normal or Safe mode to create a complete log.
 
 
The only official download link for FRST:
Download link from any site other than Bleeping Computer is unpermitted or outdated.
 
==================== Registry (Whitelisted) ==================
 
HKLM\...\Run: [SynTPEnh] - C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1049896 2008-04-17] (Synaptics, Inc.)
HKLM\...\Run: [hpWirelessAssistant] - C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe [488752 2008-04-15] (Hewlett-Packard Development Company, L.P.)
HKLM\...\Run: [SunJavaUpdateSched] - C:\Program Files\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
HKLM\...\Run: [QPService] - C:\Program Files\HP\QuickPlay\QPService.exe [468264 2008-09-23] (CyberLink Corp.)
HKLM\...\Run: [QlbCtrl.exe] - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe [202032 2008-08-01] ( Hewlett-Packard Development Company, L.P.)
HKLM\...\Run: [Adobe Reader Speed Launcher] - C:\Program Files\Adobe\Reader 9.0\Reader\Reader_sl.exe [34672 2008-06-12] (Adobe Systems Incorporated)
HKU\Default\...\Run: [HPADVISOR] - C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe [ 2008-09-30] (Hewlett-Packard)
HKU\Default User\...\Run: [HPADVISOR] - C:\Program Files\Hewlett-Packard\HP Advisor\HPAdvisor.exe [ 2008-09-30] (Hewlett-Packard)
HKU\owner\...\Run: [ehTray.exe] - C:\Windows\ehome\ehTray.exe [ 2008-01-20] (Microsoft Corporation)
 
========================== Services (Whitelisted) =================
 
S2 HP Health Check Service; c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe [94208 2008-10-09] (Hewlett-Packard)
S3 IJPLMSVC; C:\Program Files\Canon\IJPLM\IJPLMSVC.EXE [103808 2008-01-22] ()
S2 MBAMScheduler; C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
S2 MBAMService; C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
S2 Recovery Service for Windows; C:\Program Files\SMINST\BLService.exe [365952 2008-10-06] ()
S2 RichVideo; C:\Program Files\CyberLink\Shared files\RichVideo.exe [241734 2008-09-15] ()
S2 SfCtlCom; C:\Program Files\Trend Micro\Internet Security\SfCtlCom.exe [703008 2009-04-14] (Trend Micro Inc.)
S2 TMBMServer; C:\Program Files\Trend Micro\BM\TMBMSRV.exe [333064 2007-12-24] (Trend Micro Inc.)
S3 tmproxy; C:\Program Files\Trend Micro\Internet Security\TmProxy.exe [648456 2008-02-26] (Trend Micro Inc.)
 
==================== Drivers (Whitelisted) ====================
 
S3 mbamchameleon; C:\Windows\system32\drivers\mbamchameleon.sys [74456 2014-01-18] (Malwarebytes Corporation)
S3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [22856 2013-04-04] (Malwarebytes Corporation)
S2 tmactmon; C:\Windows\System32\DRIVERS\tmactmon.sys [52752 2009-04-02] (Trend Micro Inc.)
S2 tmcomm; C:\Windows\System32\DRIVERS\tmcomm.sys [142864 2009-04-02] (Trend Micro Inc.)
S2 tmevtmgr; C:\Windows\System32\DRIVERS\tmevtmgr.sys [52624 2009-04-02] (Trend Micro Inc.)
S2 tmpreflt; C:\Windows\System32\DRIVERS\tmpreflt.sys [36368 2009-05-22] (Trend Micro Inc.)
S1 tmtdi; C:\Windows\System32\DRIVERS\tmtdi.sys [65936 2008-02-15] (Trend Micro Inc.)
S2 tmxpflt; C:\Windows\System32\DRIVERS\tmxpflt.sys [225296 2009-05-22] (Trend Micro Inc.)
S3 TrueSight; C:\Windows\system32\TrueSight.sys [26624 2014-01-19] ()
S2 vsapint; C:\Windows\System32\DRIVERS\vsapint.sys [1220120 2009-05-22] (Trend Micro Inc.)
S5 AppMgmt; C:\Windows\system32\svchost.exe [21504 2008-01-20] (Microsoft Corporation)
S3 catchme; \??\C:\Users\owner\AppData\Local\Temp\catchme.sys [x]
S3 IpInIp; system32\DRIVERS\ipinip.sys [x]
S3 Netaapl; system32\DRIVERS\netaapl.sys [x]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [x]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [x]
S3 USBAAPL; System32\Drivers\usbaapl.sys [x]
 
==================== NetSvcs (Whitelisted) ===================
 
 
==================== One Month Created Files and Folders ========
 
2014-01-20 19:17 - 2014-01-20 19:19 - 00000000 _____ C:\sfc
2014-01-19 23:08 - 2014-01-19 23:08 - 00003365 _____ C:\Users\owner\Desktop\RKreport[0]_D_01202014_010847.txt
2014-01-19 23:03 - 2014-01-19 23:03 - 00003117 _____ C:\Users\owner\Desktop\RKreport[0]_S_01202014_010353.txt
2014-01-19 23:01 - 2014-01-19 23:01 - 00026624 _____ C:\Windows\System32\TrueSight.sys
2014-01-19 23:00 - 2014-01-19 23:08 - 00000000 ____D C:\Users\owner\Desktop\RK_Quarantine
2014-01-19 23:00 - 2014-01-19 23:00 - 03809280 _____ C:\Users\owner\Desktop\RogueKiller (1).exe
2014-01-19 22:14 - 2014-01-19 22:35 - 00000000 ____D C:\Users\owner\Desktop\mbar
2014-01-19 22:14 - 2014-01-19 22:14 - 00104664 _____ (Malwarebytes Corporation) C:\Windows\System32\Drivers\MBAMSwissArmy.sys
2014-01-19 10:56 - 2014-01-19 10:56 - 00014680 _____ C:\ComboFix.txt
2014-01-19 10:32 - 2014-01-19 10:06 - 05167985 ____R (Swearware) C:\Users\owner\Desktop\ComboFix.exe
2014-01-19 09:29 - 2014-01-19 09:29 - 00002201 _____ C:\Users\owner\Desktop\JRT.txt
2014-01-19 09:24 - 2014-01-19 09:24 - 00000000 ____D C:\Windows\ERUNT
2014-01-19 09:22 - 2014-01-19 09:22 - 00016238 _____ C:\Users\owner\Desktop\AdwCleaner[S0].txt
2014-01-19 09:12 - 2014-01-19 09:15 - 00000000 ____D C:\AdwCleaner
2014-01-19 09:11 - 2014-01-17 19:38 - 01236282 _____ C:\Users\owner\Desktop\AdwCleaner.exe
2014-01-19 09:11 - 2014-01-17 19:38 - 01037068 _____ (Thisisu) C:\Users\owner\Desktop\JRT.exe
2014-01-18 08:43 - 2014-01-18 08:43 - 00007298 _____ C:\Users\owner\Desktop\attach.txt
2014-01-18 08:43 - 2014-01-18 08:39 - 00011635 _____ C:\Users\owner\Desktop\dds.txt
2014-01-18 08:28 - 2014-01-17 21:01 - 00688992 ____R (Swearware) C:\Users\owner\Desktop\dds.com
2014-01-18 07:57 - 2014-01-19 22:57 - 00000966 _____ C:\Users\owner\Desktop\Rkill.txt
2014-01-18 07:56 - 2014-01-17 19:13 - 01933048 _____ (Bleeping Computer, LLC) C:\Users\owner\Desktop\rkill.exe
2014-01-18 07:03 - 2014-01-18 07:04 - 00000000 ____D C:\ProgramData\Doctor Web
2014-01-18 07:02 - 2014-01-18 07:15 - 00000000 ____D C:\Users\owner\Doctor Web
2014-01-18 02:26 - 2014-01-18 02:26 - 00000000 ____D C:\FRST
2014-01-18 00:55 - 2014-01-19 22:35 - 00000000 ____D C:\ProgramData\Malwarebytes' Anti-Malware (portable)
2014-01-18 00:50 - 2014-01-18 00:53 - 00074456 _____ (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbamchameleon.sys
2014-01-18 00:49 - 2014-01-18 00:39 - 138767368 _____ C:\Users\owner\Desktop\Dr.Web CureIt! 9.0 (20.12.2013).exe
2014-01-18 00:49 - 2014-01-17 20:36 - 12582688 _____ (Malwarebytes Corp.) C:\Users\owner\Desktop\mbar-1.07.0.1008.exe
2014-01-17 23:29 - 2014-01-19 22:56 - 00107374 _____ C:\Windows\PFRO.log
2014-01-17 19:24 - 2014-01-17 19:24 - 00000000 ____D C:\SUPERDelete
2014-01-17 19:01 - 2014-01-17 19:01 - 00000000 ____D C:\Users\owner\AppData\Roaming\SUPERAntiSpyware.com
2014-01-17 19:00 - 2014-01-17 19:04 - 00000000 ____D C:\Program Files\SUPERAntiSpyware
2014-01-17 19:00 - 2014-01-17 19:00 - 00000000 ____D C:\ProgramData\SUPERAntiSpyware.com
2014-01-17 18:51 - 2014-01-17 18:51 - 00086476 _____ C:\Users\owner\Documents\AutoRuns.txt
2014-01-17 17:54 - 2014-01-17 17:54 - 00000000 ____D C:\IObit
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\Users\owner\AppData\Roaming\IObit
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\ProgramData\ProductData
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\ProgramData\IObit
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\ProgramData\{3C5CBD7B-3D1D-411E-96C2-513FFCA84D2D}
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\Program Files\IObit
2014-01-17 17:30 - 2014-01-17 17:30 - 00000000 ____D C:\Program Files\RegTweaker
2014-01-17 12:11 - 2011-06-25 22:45 - 00256000 _____ C:\Windows\PEV.exe
2014-01-17 12:11 - 2010-11-07 09:20 - 00208896 _____ C:\Windows\MBR.exe
2014-01-17 12:11 - 2009-04-19 20:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-01-17 12:11 - 2000-08-30 16:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-01-17 12:11 - 2000-08-30 16:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-01-17 12:11 - 2000-08-30 16:00 - 00098816 _____ C:\Windows\sed.exe
2014-01-17 12:11 - 2000-08-30 16:00 - 00080412 _____ C:\Windows\grep.exe
2014-01-17 12:11 - 2000-08-30 16:00 - 00068096 _____ C:\Windows\zip.exe
2014-01-17 12:08 - 2014-01-19 10:56 - 00000000 ____D C:\Qoobox
2014-01-17 12:07 - 2014-01-17 12:07 - 02250054 _____ C:\wincreen.bmp
2014-01-17 11:56 - 2013-11-26 10:25 - 00230048 ____N (Microsoft Corporation) C:\Windows\System32\MpSigStub.exe
2014-01-17 11:55 - 2014-01-17 13:09 - 00000000 ____D C:\Windows\erdnt
2014-01-17 11:21 - 2014-01-18 07:56 - 00001945 _____ C:\Windows\epplauncher.mif
2014-01-17 11:13 - 2014-01-18 02:43 - 00000000 ____D C:\Users\owner\{cc5720af-b91f-43a3-bbc7-8bbd33686919}
2014-01-17 11:13 - 2014-01-18 02:43 - 00000000 ____D C:\Users\owner\{4480fe11-4dd1-4bbf-a478-8c91cbbd3a82}
2014-01-17 11:13 - 2014-01-17 11:13 - 11125072 _____ (Microsoft Corporation) C:\Users\owner\Downloads\mseinstall.exe
2014-01-17 11:08 - 2014-01-18 02:43 - 00000000 ____D C:\Users\owner\{e3e52ca4-11f8-4a38-9216-dff5c1e60fe5}
2014-01-17 11:08 - 2014-01-17 11:13 - 00000000 ____D C:\Windows\System32\MRT
2014-01-17 11:07 - 2014-01-17 11:07 - 00000000 ____D C:\Windows\pss
2014-01-17 10:02 - 2014-01-17 10:02 - 00000000 ____D C:\Users\owner\AppData\Roaming\Malwarebytes
2014-01-17 10:02 - 2014-01-17 10:02 - 00000000 ____D C:\ProgramData\Malwarebytes
2014-01-17 10:02 - 2014-01-17 10:02 - 00000000 ____D C:\Program Files\Malwarebytes' Anti-Malware
2014-01-17 10:02 - 2013-04-04 12:50 - 00022856 _____ (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbam.sys
2014-01-17 09:54 - 2014-01-17 09:54 - 00000000 ____D C:\Users\owner\AppData\Local\VS Revo Group
2014-01-17 09:54 - 2014-01-17 09:54 - 00000000 ____D C:\ProgramData\VS Revo Group
2014-01-13 11:42 - 2014-01-13 11:42 - 00012800 _____ C:\Users\owner\Documents\rlll bennn.wps
2014-01-10 15:58 - 2014-01-10 15:58 - 00000000 ____S C:\Windows\System32\nojp.gxx
2014-01-05 02:31 - 2014-01-05 02:31 - 00000000 ____D C:\ProgramData\WindowsSearch
2014-01-02 21:22 - 2014-01-02 21:22 - 00000000 ____S C:\Windows\System32\badtbl.fuy
2013-12-31 09:24 - 2013-12-31 09:24 - 00000000 ____S C:\Windows\System32\toxv.xed
2013-12-30 12:16 - 2013-12-30 12:16 - 00028672 _____ C:\Windows\System32\ubzj.jlv
2013-12-30 12:06 - 2014-01-19 22:42 - 00000085 _____ C:\Windows\System32\eflr.yil
2013-12-30 11:57 - 2013-12-30 12:16 - 00000097 _____ C:\Windows\System32\paxebl.zlo
2013-12-30 11:57 - 2013-12-30 11:57 - 00000064 _____ C:\Windows\System32\nzfqlj.pbt
2013-12-30 11:41 - 2013-12-30 11:41 - 00101213 ____S C:\Windows\System32\jvvwk.zzq
 
==================== One Month Modified Files and Folders =======
 
2014-01-20 19:19 - 2014-01-20 19:17 - 00000000 _____ C:\sfc
2014-01-19 23:10 - 2010-01-21 10:46 - 02077078 _____ C:\Windows\WindowsUpdate.log
2014-01-19 23:10 - 2006-11-02 04:47 - 00003216 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-01-19 23:10 - 2006-11-02 04:47 - 00003216 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-01-19 23:08 - 2014-01-19 23:08 - 00003365 _____ C:\Users\owner\Desktop\RKreport[0]_D_01202014_010847.txt
2014-01-19 23:08 - 2014-01-19 23:00 - 00000000 ____D C:\Users\owner\Desktop\RK_Quarantine
2014-01-19 23:03 - 2014-01-19 23:03 - 00003117 _____ C:\Users\owner\Desktop\RKreport[0]_S_01202014_010353.txt
2014-01-19 23:01 - 2014-01-19 23:01 - 00026624 _____ C:\Windows\System32\TrueSight.sys
2014-01-19 23:00 - 2014-01-19 23:00 - 03809280 _____ C:\Users\owner\Desktop\RogueKiller (1).exe
2014-01-19 22:57 - 2014-01-18 07:57 - 00000966 _____ C:\Users\owner\Desktop\Rkill.txt
2014-01-19 22:56 - 2014-01-17 23:29 - 00107374 _____ C:\Windows\PFRO.log
2014-01-19 22:56 - 2010-01-21 10:59 - 00000284 _____ C:\ProgramData\hpqp.ini
2014-01-19 22:42 - 2013-12-30 12:06 - 00000085 _____ C:\Windows\System32\eflr.yil
2014-01-19 22:36 - 2008-10-23 02:26 - 00000000 ____D C:\Program Files\Microsoft Office
2014-01-19 22:35 - 2014-01-19 22:14 - 00000000 ____D C:\Users\owner\Desktop\mbar
2014-01-19 22:35 - 2014-01-18 00:55 - 00000000 ____D C:\ProgramData\Malwarebytes' Anti-Malware (portable)
2014-01-19 22:14 - 2014-01-19 22:14 - 00104664 _____ (Malwarebytes Corporation) C:\Windows\System32\Drivers\MBAMSwissArmy.sys
2014-01-19 22:12 - 2006-11-02 04:42 - 00000000 ____D C:\Windows\WindowsMobile
2014-01-19 10:56 - 2014-01-19 10:56 - 00014680 _____ C:\ComboFix.txt
2014-01-19 10:56 - 2014-01-17 12:08 - 00000000 ____D C:\Qoobox
2014-01-19 10:53 - 2006-11-02 02:23 - 00000215 _____ C:\Windows\system.ini
2014-01-19 10:06 - 2014-01-19 10:32 - 05167985 ____R (Swearware) C:\Users\owner\Desktop\ComboFix.exe
2014-01-19 09:29 - 2014-01-19 09:29 - 00002201 _____ C:\Users\owner\Desktop\JRT.txt
2014-01-19 09:24 - 2014-01-19 09:24 - 00000000 ____D C:\Windows\ERUNT
2014-01-19 09:22 - 2014-01-19 09:22 - 00016238 _____ C:\Users\owner\Desktop\AdwCleaner[S0].txt
2014-01-19 09:15 - 2014-01-19 09:12 - 00000000 ____D C:\AdwCleaner
2014-01-18 09:47 - 2010-01-21 00:11 - 00000000 ____D C:\users\owner
2014-01-18 09:47 - 2006-11-02 03:18 - 00000000 ____D C:\Windows\System32\Msdtc
2014-01-18 09:47 - 2006-11-02 03:18 - 00000000 ____D C:\Windows\registration
2014-01-18 09:47 - 2006-11-02 02:22 - 42491904 _____ C:\Windows\System32\config\software_previous
2014-01-18 09:47 - 2006-11-02 02:22 - 17563648 _____ C:\Windows\System32\config\system_previous
2014-01-18 09:43 - 2006-11-02 02:22 - 00057344 _____ C:\Windows\System32\config\sam_previous
2014-01-18 09:43 - 2006-11-02 02:22 - 00024576 _____ C:\Windows\System32\config\security_previous
2014-01-18 08:43 - 2014-01-18 08:43 - 00007298 _____ C:\Users\owner\Desktop\attach.txt
2014-01-18 08:39 - 2014-01-18 08:43 - 00011635 _____ C:\Users\owner\Desktop\dds.txt
2014-01-18 07:56 - 2014-01-17 11:21 - 00001945 _____ C:\Windows\epplauncher.mif
2014-01-18 07:42 - 2006-11-02 02:22 - 35418112 _____ C:\Windows\System32\config\components_previous
2014-01-18 07:42 - 2006-11-02 02:22 - 00262144 _____ C:\Windows\System32\config\default_previous
2014-01-18 07:15 - 2014-01-18 07:02 - 00000000 ____D C:\Users\owner\Doctor Web
2014-01-18 07:04 - 2014-01-18 07:03 - 00000000 ____D C:\ProgramData\Doctor Web
2014-01-18 06:13 - 2013-08-10 10:01 - 00001887 _____ C:\Users\Public\Desktop\Google Chrome.lnk
2014-01-18 02:43 - 2014-01-17 11:13 - 00000000 ____D C:\Users\owner\{cc5720af-b91f-43a3-bbc7-8bbd33686919}
2014-01-18 02:43 - 2014-01-17 11:13 - 00000000 ____D C:\Users\owner\{4480fe11-4dd1-4bbf-a478-8c91cbbd3a82}
2014-01-18 02:43 - 2014-01-17 11:08 - 00000000 ____D C:\Users\owner\{e3e52ca4-11f8-4a38-9216-dff5c1e60fe5}
2014-01-18 02:43 - 2012-12-28 08:06 - 00000000 ____D C:\Users\owner\AppData\Roaming\WildTangent
2014-01-18 02:43 - 2012-04-07 06:38 - 00000000 ____D C:\Windows\Minidump
2014-01-18 02:43 - 2010-02-28 14:19 - 00000000 ____D C:\Users\owner\AppData\Roaming\UB
2014-01-18 02:43 - 2010-02-28 13:03 - 00000000 ____D C:\Users\owner\AppData\Local\PokerStars
2014-01-18 02:43 - 2010-01-22 00:04 - 00000000 ____D C:\Users\owner\AppData\Local\QuickPlay
2014-01-18 02:43 - 2006-11-02 03:18 - 00000000 ____D C:\Windows\System32\spool
2014-01-18 02:38 - 2010-01-22 09:28 - 00000000 ____D C:\Program Files\Trend Micro
2014-01-18 02:26 - 2014-01-18 02:26 - 00000000 ____D C:\FRST
2014-01-18 00:58 - 2006-11-02 03:18 - 00000000 ____D C:\Windows\System32\winevt
2014-01-18 00:53 - 2014-01-18 00:50 - 00074456 _____ (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbamchameleon.sys
2014-01-18 00:39 - 2014-01-18 00:49 - 138767368 _____ C:\Users\owner\Desktop\Dr.Web CureIt! 9.0 (20.12.2013).exe
2014-01-17 23:27 - 2010-01-21 01:57 - 00000000 ____D C:\ProgramData\Trend Micro
2014-01-17 23:17 - 2010-01-21 00:15 - 00075832 _____ C:\Users\owner\AppData\Local\GDIPFONTCACHEV1.DAT
2014-01-17 21:01 - 2014-01-18 08:28 - 00688992 ____R (Swearware) C:\Users\owner\Desktop\dds.com
2014-01-17 20:36 - 2014-01-18 00:49 - 12582688 _____ (Malwarebytes Corp.) C:\Users\owner\Desktop\mbar-1.07.0.1008.exe
2014-01-17 19:38 - 2014-01-19 09:11 - 01236282 _____ C:\Users\owner\Desktop\AdwCleaner.exe
2014-01-17 19:38 - 2014-01-19 09:11 - 01037068 _____ (Thisisu) C:\Users\owner\Desktop\JRT.exe
2014-01-17 19:24 - 2014-01-17 19:24 - 00000000 ____D C:\SUPERDelete
2014-01-17 19:13 - 2014-01-18 07:56 - 01933048 _____ (Bleeping Computer, LLC) C:\Users\owner\Desktop\rkill.exe
2014-01-17 19:04 - 2014-01-17 19:00 - 00000000 ____D C:\Program Files\SUPERAntiSpyware
2014-01-17 19:01 - 2014-01-17 19:01 - 00000000 ____D C:\Users\owner\AppData\Roaming\SUPERAntiSpyware.com
2014-01-17 19:00 - 2014-01-17 19:00 - 00000000 ____D C:\ProgramData\SUPERAntiSpyware.com
2014-01-17 18:51 - 2014-01-17 18:51 - 00086476 _____ C:\Users\owner\Documents\AutoRuns.txt
2014-01-17 18:28 - 2008-10-23 01:54 - 00000000 ____D C:\Windows\panther
2014-01-17 17:54 - 2014-01-17 17:54 - 00000000 ____D C:\IObit
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\Users\owner\AppData\Roaming\IObit
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\ProgramData\ProductData
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\ProgramData\IObit
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\ProgramData\{3C5CBD7B-3D1D-411E-96C2-513FFCA84D2D}
2014-01-17 17:52 - 2014-01-17 17:52 - 00000000 ____D C:\Program Files\IObit
2014-01-17 17:52 - 2012-11-19 10:55 - 00000000 ____D C:\Users\owner\AppData\Roaming\Apple Computer
2014-01-17 17:30 - 2014-01-17 17:30 - 00000000 ____D C:\Program Files\RegTweaker
2014-01-17 13:30 - 2010-01-21 10:51 - 00000000 ____D C:\Program Files\Intel
2014-01-17 13:13 - 2006-11-02 03:18 - 00000000 __RHD C:\users\Default
2014-01-17 13:13 - 2006-11-02 03:18 - 00000000 ___RD C:\users\Public
2014-01-17 13:09 - 2014-01-17 11:55 - 00000000 ____D C:\Windows\erdnt
2014-01-17 12:56 - 2006-11-02 02:22 - 42729472 _____ C:\Windows\System32\config\SOFTWARE.bak
2014-01-17 12:56 - 2006-11-02 02:22 - 35651584 _____ C:\Windows\System32\config\COMPON~1.bak
2014-01-17 12:56 - 2006-11-02 02:22 - 17563648 _____ C:\Windows\System32\config\SYSTEM.bak
2014-01-17 12:56 - 2006-11-02 02:22 - 00262144 _____ C:\Windows\System32\config\SECURITY.bak
2014-01-17 12:56 - 2006-11-02 02:22 - 00262144 _____ C:\Windows\System32\config\SAM.bak
2014-01-17 12:56 - 2006-11-02 02:22 - 00262144 _____ C:\Windows\System32\config\DEFAULT.bak
2014-01-17 12:07 - 2014-01-17 12:07 - 02250054 _____ C:\wincreen.bmp
2014-01-17 11:42 - 2008-10-23 02:38 - 00000000 ____D C:\ProgramData\Microsoft Help
2014-01-17 11:23 - 2011-01-23 15:03 - 00000000 ____D C:\Program Files\Google
2014-01-17 11:13 - 2014-01-17 11:13 - 11125072 _____ (Microsoft Corporation) C:\Users\owner\Downloads\mseinstall.exe
2014-01-17 11:13 - 2014-01-17 11:08 - 00000000 ____D C:\Windows\System32\MRT
2014-01-17 11:07 - 2014-01-17 11:07 - 00000000 ____D C:\Windows\pss
2014-01-17 11:05 - 2011-01-23 15:04 - 00000000 ____D C:\Users\owner\AppData\Local\Google
2014-01-17 11:05 - 2011-01-23 15:03 - 00000000 ____D C:\ProgramData\Google
2014-01-17 10:45 - 2013-04-07 20:10 - 00000000 ____D C:\Users\owner\AppData\Roaming\player
2014-01-17 10:02 - 2014-01-17 10:02 - 00000000 ____D C:\Users\owner\AppData\Roaming\Malwarebytes
2014-01-17 10:02 - 2014-01-17 10:02 - 00000000 ____D C:\ProgramData\Malwarebytes
2014-01-17 10:02 - 2014-01-17 10:02 - 00000000 ____D C:\Program Files\Malwarebytes' Anti-Malware
2014-01-17 09:55 - 2006-11-02 02:33 - 00748622 _____ C:\Windows\System32\PerfStringBackup.INI
2014-01-17 09:54 - 2014-01-17 09:54 - 00000000 ____D C:\Users\owner\AppData\Local\VS Revo Group
2014-01-17 09:54 - 2014-01-17 09:54 - 00000000 ____D C:\ProgramData\VS Revo Group
2014-01-15 14:19 - 2010-01-21 16:03 - 00007680 _____ C:\Users\owner\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2014-01-14 16:32 - 2010-01-26 18:27 - 00000052 _____ C:\Windows\System32\DOErrors.log
2014-01-13 11:42 - 2014-01-13 11:42 - 00012800 _____ C:\Users\owner\Documents\rlll bennn.wps
2014-01-13 11:42 - 2010-01-21 19:42 - 00000476 _____ C:\Users\owner\AppData\Roaming\wklnhst.dat
2014-01-12 11:47 - 2010-01-21 15:07 - 00007052 _____ C:\Users\owner\AppData\Local\d3d9caps.dat
2014-01-10 15:58 - 2014-01-10 15:58 - 00000000 ____S C:\Windows\System32\nojp.gxx
2014-01-06 14:20 - 2006-11-02 02:24 - 83425928 _____ (Microsoft Corporation) C:\Windows\System32\mrt.exe
2014-01-05 02:31 - 2014-01-05 02:31 - 00000000 ____D C:\ProgramData\WindowsSearch
2014-01-02 22:13 - 2011-08-04 13:47 - 00012800 _____ C:\Users\owner\Documents\Mary's Resume.wps
2014-01-02 21:22 - 2014-01-02 21:22 - 00000000 ____S C:\Windows\System32\badtbl.fuy
2013-12-31 09:24 - 2013-12-31 09:24 - 00000000 ____S C:\Windows\System32\toxv.xed
2013-12-30 12:16 - 2013-12-30 12:16 - 00028672 _____ C:\Windows\System32\ubzj.jlv
2013-12-30 12:16 - 2013-12-30 11:57 - 00000097 _____ C:\Windows\System32\paxebl.zlo
2013-12-30 11:57 - 2013-12-30 11:57 - 00000064 _____ C:\Windows\System32\nzfqlj.pbt
2013-12-30 11:41 - 2013-12-30 11:41 - 00101213 ____S C:\Windows\System32\jvvwk.zzq
2013-12-24 16:58 - 2010-01-21 00:18 - 00000000 ____D C:\Users\owner\AppData\Roaming\Hewlett-Packard
2013-12-24 16:58 - 2010-01-21 00:18 - 00000000 ____D C:\Users\owner\AppData\Local\Hewlett-Packard
2013-12-24 16:58 - 2008-10-23 01:40 - 00000000 ____D C:\ProgramData\Hewlett-Packard
 
Some content of TEMP:
====================
C:\Users\owner\AppData\Local\Temp\ntdll_dump.dll
 
 
==================== Known DLLs (Whitelisted) ============
 
 
==================== Bamital & volsnap Check =================
 
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll
[2010-01-21 13:37] - [2009-03-02 20:39] - 0551424 ____A (Microsoft Corporation) 301AE00E12408650BADDC04DBC832830
 
 ATTENTION ======> If the system is having audio adware rpcss.dll is patched. Google the MD5, if the MD5 is unique the file is infected.
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
 
==================== EXE ASSOCIATION =====================
 
HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK
 
==================== Restore Points  =========================
 
Restore point made on: 2013-12-06 00:58:29
Restore point made on: 2013-12-10 00:42:28
Restore point made on: 2013-12-12 01:00:27
Restore point made on: 2013-12-12 14:02:55
Restore point made on: 2013-12-13 15:52:16
Restore point made on: 2013-12-14 12:03:44
Restore point made on: 2013-12-17 09:57:37
Restore point made on: 2013-12-18 15:27:30
Restore point made on: 2013-12-19 14:06:46
Restore point made on: 2013-12-20 05:39:28
Restore point made on: 2013-12-20 22:49:23
Restore point made on: 2013-12-22 00:45:21
Restore point made on: 2013-12-23 14:41:52
Restore point made on: 2013-12-24 17:36:28
Restore point made on: 2013-12-26 15:43:39
Restore point made on: 2013-12-28 10:33:57
Restore point made on: 2013-12-28 22:57:41
Restore point made on: 2013-12-30 10:44:20
Restore point made on: 2014-01-17 11:38:29
Restore point made on: 2014-01-17 11:54:08
Restore point made on: 2014-01-17 12:01:59
Restore point made on: 2014-01-17 13:23:00
Restore point made on: 2014-01-18 06:58:04
Restore point made on: 2014-01-18 08:33:34
Restore point made on: 2014-01-19 22:36:24
 
==================== Memory info =========================== 
 
Percentage of memory in use: 14%
Total physical RAM: 3002.58 MB
Available physical RAM: 2554.93 MB
Total Pagefile: 2781.96 MB
Available Pagefile: 2609.43 MB
Total Virtual: 2047.88 MB
Available Virtual: 1980.14 MB
 
==================== Drives ================================
 
Drive c: () (Fixed) (Total:287.21 GB) (Free:203.88 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
Drive d: (RECOVERY) (Fixed) (Total:10.88 GB) (Free:1.77 GB) NTFS ==>[System with boot components (obtained from reading drive)]
Drive e: (VISTA_32_PREMIUM) (CDROM) (Total:2.84 GB) (Free:0 GB) CDFS
Drive g: () (Removable) (Total:28.88 GB) (Free:26.21 GB) FAT32
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
 
==================== MBR & Partition Table ==================
 
========================================================
Disk: 0 (Size: 298 GB) (Disk ID: 678B1560)
Partition 1: (Active) - (Size=287 GB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=11 GB) - (Type=07 NTFS)
 
========================================================
Disk: 2 (Size: 29 GB) (Disk ID: D0333AFB)
Partition 1: (Active) - (Size=29 GB) - (Type=0C)
 
 
LastRegBack: 2014-01-20 12:31
 
==================== End Of Log ============================


#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:55 PM

Posted 21 January 2014 - 01:54 AM

Hello


The file looks good so lets try a system restore

I want you to go back into the recovery environment and this time select System Restore and try restoring to before this happened


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 21 January 2014 - 04:09 PM

I restored to the last restore point but now the commercials are back. If i turn the WLAN off the commercials go away. Its a HP Laptop.


Edited by Stinkyweed, 21 January 2014 - 04:50 PM.


#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:55 PM

Posted 21 January 2014 - 04:54 PM

lets download just this one


download Malwarebytes Anti-Rootkit (MBAR) from here http://downloads.malwarebytes.org/file/mbar and save it to your desktop.

•Be sure to print out and follow the instructions provided on that same page.

•Caution: This is a beta version so please be sure to read the disclaimer and back up any important data before using.

•Doubleclick on the MBAR file you downloaded.
•Approve the UAC prompt in Vista and newer operating systems.
•Click OK on the next screen, to allow the package to extract the contents of the file to it's own folder, mbar.
•By default, this will be on your desktop, though you can choose another location if you wish. We advise using the default location for simplicity.
•mbar.exe will launch automatically. On some systems, this may take a few extra seconds. Please be patient and wait for the program to open.
•After reading the Introduction, click 'Next' if you agree.
•On the Update Database screen, click on the 'Update' button.
•Once you see 'Success: Database was successfully updated' click on 'Next'.
•Click the 'Scan' button.

A.With some infections, you may see two messages boxes.
1.'Could not load protection driver'. Click 'OK'.
2.'Could not load DDA driver'. Click 'Yes' to this message, to allow the driver to load after a restart. Allow the computer to restart. Continue with the rest of these instructions.

-
Please monitor the scan. If during the scan you see a message that says this:
"could not be remediated because backup file is not available"

Do NOT click Cleanup when it becomes available, but rather click Exit, and provide the same logs as requested below.





•If malware is found, click the 'Cleanup' button with the above mentioned exception.

Once the system restore point is created and the cleanup is scheduled, a 'Reboot required' message will appear.
Click 'Yes' and allow the computer to reboot.

Once back in Windows, run mbar.exe once again to ensure all previously detected items have been removed, and no additional threats found.

Please send all logs which were generated.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 Stinkyweed

Stinkyweed
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:12:55 PM

Posted 21 January 2014 - 06:52 PM

It did find the virus Zekos and i clicked clean up . It said it needed to restart to finish cleanup so i said yes and once it rebooted i'm back at the black screen with cursor. 

 

Oh wait nevermind i'm in windows now. I will run it again per your instructions above . i will post as soon as i am done. THanks aagain for all the help.


Edited by Stinkyweed, 21 January 2014 - 06:54 PM.





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users