Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Hi forum!


  • Please log in to reply
15 replies to this topic

#1 The Seeker of Truth

The Seeker of Truth

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 16 February 2014 - 10:32 AM

Hi! I came here to say hello and to try to find a fix for my dad's computer which seems to have WinBifrost32 on it, as reported by spybot. No other programs report it and spybot cannot not remove it. I also ran mbam and a full norton scan, neither of which reported the infection. Anyway, I hope everyone is having a nice Sunday.

John in Florida



BC AdBot (Login to Remove)

 


#2 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,699 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:00 AM

Posted 16 February 2014 - 02:20 PM

Welcome aboard p22002758.gif

 

p22002970.gif Download Security Check from here or here and save it to your Desktop.

  • Double-click SecurityCheck.exe
  • Follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

NOTE 1. If one of your security applications (e.g., third-party firewall) requests permission to allow DIG.EXE access the Internet, allow it to do so.
NOTE 2 SecurityCheck may produce some false warning(s), so leave the results reading to me.

p22002970.gif Please download Farbar Service Scanner (FSS) and run it on the computer with the issue.
  • Make sure the following options are checked:
    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


p22002970.gif Please download MiniToolBox and run it.

Checkmark following boxes:
  • Report IE Proxy Settings
  • Report FF Proxy Settings
  • List content of Hosts
  • List IP configuration
  • List Winsock Entries
  • List last 10 Event Viewer log
  • List Installed Programs
  • List Devices (do NOT change any settings here)
  • List Users, Partitions and Memory size

Click Go and post the result.

p22002970.gif Download Malwarebytes' Anti-Malware (aka MBAM): https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/ to your desktop.

* Double-click mbam-setup.exe and follow the prompts to install the program.
* At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.
* If an update is found, it will download and install the latest version.
* Once the program has loaded, select Perform quick scan, then click Scan.
* When the scan is complete, click OK, then Show Results to view the results.
* Be sure that everything is checked, and click Remove Selected.
* When completed, a log will open in Notepad.
* Post the log back here.

Be sure to restart the computer.

The log can also be found here:
C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\log-date.txt
Or at C:\Program Files\Malwarebytes' Anti-Malware\Logs\log-date.txt

p22002970.gifDownload Malwarebytes Anti-Rootkit from HERE to your Desktop.
  • Unzip downloaded file.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • DO NOT click on the Cleanup button. Simply exit the program.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log-xxxxx.txt and system-log.txt


p22002970.gif Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.


If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

NOTE Do NOT wrap your logs in "quote" or "code" brackets. Do NOT use spoilers.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#3 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 20 February 2014 - 01:58 PM

Hi Broni, Thank you for the reply!

here is the first file from:  security check

 

 

 Results of screen317's Security Check version 0.99.79  
 Windows Vista Service Pack 2 x64 (UAC is enabled)  
 Internet Explorer 9  
 Internet Explorer 8  
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled!  
Norton Internet Security   
 WMI entry may not exist for antivirus; attempting automatic update.
`````````Anti-malware/Other Utilities Check:`````````
 Spybot - Search & Destroy
 Malwarebytes Anti-Malware version 1.75.0.1300  
 Java 7 Update 45  
 Java version out of Date!
 Adobe Flash Player     12.0.0.44  
 Adobe Reader 7 Adobe Reader out of Date!
 Mozilla Firefox (27.0.1)
 Google Chrome 31.0.1650.63  
 Google Chrome 32.0.1700.107  
````````Process Check: objlist.exe by Laurent````````  
 Spybot Teatimer.exe is disabled!
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 2 % Defragment your hard drive soon! (Do NOT defrag if SSD!)
````````````````````End of Log``````````````````````

 

 

FSS LOG:

 

 

Farbar Service Scanner Version: 16-02-2014
Ran by John SR (administrator) on 20-02-2014 at 12:12:01
Running from "C:\Users\John SR\Downloads"
Microsoft® Windows Vista™ Home Premium  Service Pack 2 (X64)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Yahoo.com is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================


System Restore:
============

System Restore Disabled Policy:
========================


Security Center:
============


Windows Update:
============

Windows Autoupdate Disabled Policy:
============================


Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is OK.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.


Windows Defender Disabled Policy:
==========================
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware"=DWORD:1


Other Services:
==============


File Check:
========
C:\Windows\System32\nsisvc.dll => MD5 is legit
C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
C:\Windows\System32\dhcpcsvc.dll => MD5 is legit
C:\Windows\System32\drivers\afd.sys
[2013-11-24 10:12] - [2013-09-03 21:31] - 0404992 ____A (Microsoft Corporation) 2BA159E1F9FD75F6A496742B20F1D9CF

C:\Windows\System32\drivers\tdx.sys => MD5 is legit
C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit
C:\Windows\System32\dnsrslvr.dll => MD5 is legit
C:\Windows\System32\mpssvc.dll => MD5 is legit
C:\Windows\System32\bfe.dll => MD5 is legit
C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
C:\Windows\System32\SDRSVC.dll => MD5 is legit
C:\Windows\System32\vssvc.exe => MD5 is legit
C:\Windows\System32\wscsvc.dll => MD5 is legit
C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\System32\wuaueng.dll => MD5 is legit
C:\Windows\System32\qmgr.dll => MD5 is legit
C:\Windows\System32\es.dll => MD5 is legit
C:\Windows\System32\cryptsvc.dll => MD5 is legit
C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
C:\Windows\System32\ipnathlp.dll => MD5 is legit
C:\Windows\System32\iphlpsvc.dll => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit


**** End of log **

 

Mini tool box:

 

MiniToolBox by Farbar  Version: 23-01-2014
Ran by John SR (administrator) on 20-02-2014 at 12:14:51
Running from "C:\Users\John SR\Downloads"
Microsoft® Windows Vista™ Home Premium  Service Pack 2 (X64)
Boot Mode: Normal
***************************************************************************

========================= IE Proxy Settings: ==============================

Proxy is not enabled.
No Proxy Server is set.

========================= FF Proxy Settings: ==============================

========================= Hosts content: =================================

::1             localhost

127.0.0.1       localhost

========================= IP Configuration: ================================

Realtek RTL8168C(P)/8111C(P) Family PCI-E GBE NIC = Local Area Connection (Connected)


# ----------------------------------
# IPv4 Configuration
# ----------------------------------
pushd interface ipv4

reset
set global icmpredirects=enabled


popd
# End of IPv4 configuration



Windows IP Configuration

   Host Name . . . . . . . . . . . . : JohnSR-PC
   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Mixed
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Local Area Connection:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Realtek RTL8168C(P)/8111C(P) Family PCI-E GBE NIC
   Physical Address. . . . . . . . . : 00-24-8C-AA-4E-D6
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::1cb4:3853:91f9:7298%10(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.1.167(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Thursday, February 20, 2014 11:45:05 AM
   Lease Expires . . . . . . . . . . : Friday, February 21, 2014 11:45:05 AM
   Default Gateway . . . . . . . . . : fe80::62a4:5cff:fea1:6c60%10
                                       192.168.1.1
   DHCP Server . . . . . . . . . . . : 192.168.1.1
   DHCPv6 IAID . . . . . . . . . . . : 251667596
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-15-FE-E4-71-00-24-8C-AA-3A-D6
   DNS Servers . . . . . . . . . . . : fe80::72a4:4cff:fea1:6c60%10
                                       192.168.1.1
   NetBIOS over Tcpip. . . . . . . . : Enabled

Tunnel adapter Local Area Connection* 6:

   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
   Physical Address. . . . . . . . . : 02-00-54-55-4E-01
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2001:0:9d38:6ab8:147d:2c78:3f57:fe58(Preferred)
   Link-local IPv6 Address . . . . . : fe80::147d:2c78:3f57:fe58%11(Preferred)
   Default Gateway . . . . . . . . . : ::
   NetBIOS over Tcpip. . . . . . . . : Disabled

Tunnel adapter Local Area Connection* 7:

   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : isatap.{23910CEA-C965-56E4-B5BA-3D11043DE351}
   Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
Server:  UnKnown
Address:  fe80::62b4:4cff:fea1:6c60

Name:    google.com
Addresses:  2607:f8b0:4000:808::1009
      173.194.115.110
      173.194.115.96
      173.194.115.97
      173.194.115.98
      173.194.115.99
      173.194.115.100
      173.194.115.101
      173.194.115.102
      173.194.115.103
      173.194.115.104
      173.194.115.105

Pinging google.com [173.194.115.105] with 32 bytes of data:Reply from 173.194.115.105: bytes=32 time=46ms TTL=49Reply from 173.194.115.105: bytes=32 time=45ms TTL=49Ping statistics for 173.194.115.105:    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:    Minimum = 45ms, Maximum = 46ms, Average = 45msServer:  UnKnown
Address:  fe80::52a4:4cff:fea1:6c60

Name:    yahoo.com
Addresses:  98.138.253.109
      206.190.36.45
      98.139.183.24

Pinging yahoo.com [206.190.36.45] with 32 bytes of data:Request timed out.Reply from 206.190.36.45: bytes=32 time=131ms TTL=41Ping statistics for 206.190.36.45:    Packets: Sent = 2, Received = 1, Lost = 1 (50% loss),Approximate round trip times in milli-seconds:    Minimum = 131ms, Maximum = 131ms, Average = 131msPinging 127.0.0.1 with 32 bytes of data:Reply from 127.0.0.1: bytes=32 time<1ms TTL=128Reply from 127.0.0.1: bytes=32 time<1ms TTL=128Ping statistics for 127.0.0.1:    Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),Approximate round trip times in milli-seconds:    Minimum = 0ms, Maximum = 0ms, Average = 0ms===========================================================================
Interface List
 10 ...00 24 8c aa 3e d6 ...... Realtek RTL8168C(P)/8111C(P) Family PCI-E GBE NIC
  1 ........................... Software Loopback Interface 1
 11 ...02 00 54 55 4e 01 ...... Teredo Tunneling Pseudo-Interface
 12 ...00 00 00 00 00 00 00 e0  isatap.{23910CEA-C964-46E4-B5BA-3D11043DE351}
===========================================================================

IPv4 Route Table
===========================================================================
Active Routes:
Network Destination        Netmask          Gateway       Interface  Metric
          0.0.0.0          0.0.0.0      192.168.1.1    192.168.1.167     10
        127.0.0.0        255.0.0.0         On-link         127.0.0.1    306
        127.0.0.1  255.255.255.255         On-link         127.0.0.1    306
  127.255.255.255  255.255.255.255         On-link         127.0.0.1    306
      192.168.1.0    255.255.255.0         On-link     192.168.1.167    266
    192.168.1.167  255.255.255.255         On-link     192.168.1.167    266
    192.168.1.255  255.255.255.255         On-link     192.168.1.167    266
        224.0.0.0        240.0.0.0         On-link         127.0.0.1    306
        224.0.0.0        240.0.0.0         On-link     192.168.1.167    266
  255.255.255.255  255.255.255.255         On-link         127.0.0.1    306
  255.255.255.255  255.255.255.255         On-link     192.168.1.167    266
===========================================================================
Persistent Routes:
  None

IPv6 Route Table
===========================================================================
Active Routes:
 If Metric Network Destination      Gateway
 10    266 ::/0                     fe80::62a4:4cff:fea1:6c60
 11     18 ::/0                     On-link
  1    306 ::1/128                  On-link
 11     18 2001::/32                On-link
 11    266 2001:0:9d38:6ab8:147d:2c78:3f57:fe58/128
                                    On-link
 10    266 fe80::/64                On-link
 11    266 fe80::/64                On-link
 11    266 fe80::147d:2c78:3f57:fe58/128
                                    On-link
 10    266 fe80::1ca4:3853:91f9:7298/128
                                    On-link
  1    306 ff00::/8                 On-link
 11    266 ff00::/8                 On-link
 10    266 ff00::/8                 On-link
===========================================================================
Persistent Routes:
  None
========================= Winsock entries =====================================

Catalog5 01 C:\Windows\SysWOW64\NLAapi.dll [48128] (Microsoft Corporation)
Catalog5 02 C:\Windows\SysWOW64\napinsp.dll [50176] (Microsoft Corporation)
Catalog5 03 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 04 C:\Windows\SysWOW64\pnrpnsp.dll [62464] (Microsoft Corporation)
Catalog5 05 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog5 06 C:\Windows\SysWOW64\winrnr.dll [19968] (Microsoft Corporation)
Catalog9 01 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 02 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 03 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 04 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 05 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 06 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 07 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 08 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 09 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
Catalog9 10 C:\Windows\SysWOW64\mswsock.dll [223232] (Microsoft Corporation)
x64-Catalog5 01 C:\Windows\System32\NLAapi.dll [61440] (Microsoft Corporation)
x64-Catalog5 02 C:\Windows\System32\napinsp.dll [62976] (Microsoft Corporation)
x64-Catalog5 03 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 04 C:\Windows\System32\pnrpnsp.dll [78848] (Microsoft Corporation)
x64-Catalog5 05 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog5 06 C:\Windows\System32\winrnr.dll [27648] (Microsoft Corporation)
x64-Catalog9 01 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 02 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 03 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 04 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 05 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 06 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 07 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 08 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 09 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)
x64-Catalog9 10 C:\Windows\System32\mswsock.dll [304128] (Microsoft Corporation)

========================= Event log errors: ===============================

Application errors:
==================
Error: (02/20/2014 11:55:26 AM) (Source: Application Error) (User: )
Description: Faulting application SDTools.exe, version 2.2.18.150, time stamp 0x51949fd7, faulting module rtl150.bpl, version 15.0.3953.35171, time stamp 0x4cca139f, exception code 0xc0000005, fault offset 0x0000a116,
process id 0x13d0, application start time 0xSDTools.exe0.

Error: (02/20/2014 11:45:39 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/19/2014 07:30:58 PM) (Source: Windows Search Service) (User: )
Description: The entry <C:\USERS\JOHN SR\APPDATA\LOCAL\MOZILLA\FIREFOX\PROFILES\1I0H0UX7.DEFAULT\SAFEBROWSING-BACKUP> in the hash map cannot be updated.

Context:  Application, SystemIndex Catalog


Details:
    A device attached to the system is not functioning.   (0x8007001f)

Error: (02/19/2014 07:25:58 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/18/2014 00:05:51 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/17/2014 08:54:52 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/16/2014 02:21:31 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/15/2014 11:14:00 AM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/14/2014 07:00:07 PM) (Source: .NET Runtime Optimization Service) (User: )
Description: .NET Runtime Optimization Service (clr_optimization_v4.0.30319_64) - Failed to execute command from the offline queue: uninstall "System.Web.RegularExpressions, Version=2.0.0.0, Culture=Neutral, PublicKeyToken=b03f5f7f11d50a3a, processorArchitecture=msil" /NoDependencies .  The error returned was Error: The specified assembly is not installed.
.

Error: (02/14/2014 06:59:51 PM) (Source: WinMgmt) (User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003


System errors:
=============
Error: (02/20/2014 11:46:42 AM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/19/2014 10:14:51 PM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/19/2014 07:32:59 PM) (Source: Service Control Manager) (User: )
Description: Windows Update

Error: (02/19/2014 07:26:57 PM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/18/2014 10:38:13 PM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/18/2014 00:06:56 PM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/17/2014 11:17:06 PM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/17/2014 08:56:38 AM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/16/2014 11:06:17 PM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)

Error: (02/16/2014 04:14:17 PM) (Source: DCOM) (User: JohnSR-PC)
Description: application-specificLocalActivation{0C0A3666-30C9-11D0-8F20-00805F2CD064}JohnSR-PCJohn SRS-1-5-21-670819545-1279240186-1419955333-1000LocalHost (Using LRPC)


Microsoft Office Sessions:
=========================
Error: (02/20/2014 11:55:26 AM) (Source: Application Error)(User: )
Description: SDTools.exe2.2.18.15051949fd7rtl150.bpl15.0.3953.351714cca139fc00000050000a11613d001cf2e5c7db3b803

Error: (02/20/2014 11:45:39 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/19/2014 07:30:58 PM) (Source: Windows Search Service)(User: )
Description: Context:  Application, SystemIndex Catalog


Details:
    A device attached to the system is not functioning.   (0x8007001f)
C:\USERS\JOHN SR\APPDATA\LOCAL\MOZILLA\FIREFOX\PROFILES\1I0H0UX7.DEFAULT\SAFEBROWSING-BACKUP

Error: (02/19/2014 07:25:58 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/18/2014 00:05:51 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/17/2014 08:54:52 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/16/2014 02:21:31 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/15/2014 11:14:00 AM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003

Error: (02/14/2014 07:00:07 PM) (Source: .NET Runtime Optimization Service)(User: )
Description: .NET Runtime Optimization Service (clr_optimization_v4.0.30319_64) - Failed to execute command from the offline queue: uninstall "System.Web.RegularExpressions, Version=2.0.0.0, Culture=Neutral, PublicKeyToken=b03f5f7f11d50a3a, processorArchitecture=msil" /NoDependencies .  The error returned was Error: The specified assembly is not installed.
.

Error: (02/14/2014 06:59:51 PM) (Source: WinMgmt)(User: )
Description: //./root/CIMV2SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA "Win32_Processor" AND TargetInstance.LoadPercentage > 990x80041003


CodeIntegrity Errors:
===================================
  Date: 2014-02-14 08:41:19.224
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files (x86)\Norton Internet Security\NortonData\21.1.0.18\Definitions\BASHDefs\20140121.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.

  Date: 2014-02-14 08:41:19.042
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files (x86)\Norton Internet Security\NortonData\21.1.0.18\Definitions\BASHDefs\20140121.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.

  Date: 2014-02-14 08:41:18.848
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files (x86)\Norton Internet Security\NortonData\21.1.0.18\Definitions\BASHDefs\20140121.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.

  Date: 2014-02-14 08:41:18.662
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files (x86)\Norton Internet Security\NortonData\21.1.0.18\Definitions\BASHDefs\20140121.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.

  Date: 2014-02-14 08:41:18.475
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files (x86)\Norton Internet Security\NortonData\21.1.0.18\Definitions\BASHDefs\20140121.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.

  Date: 2014-02-14 08:41:18.274
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Program Files (x86)\Norton Internet Security\NortonData\21.1.0.18\Definitions\BASHDefs\20140121.001\BHDrvx64.sys because the set of per-page image hashes could not be found on the system.

  Date: 2013-11-23 18:40:27.214
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Users\JOHNSR~1\AppData\Local\Temp\TEMP.^^^\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.

  Date: 2013-11-23 18:40:27.047
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Users\JOHNSR~1\AppData\Local\Temp\TEMP.^^^\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.

  Date: 2013-11-23 18:40:26.851
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Users\JOHNSR~1\AppData\Local\Temp\TEMP.^^^\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.

  Date: 2013-11-23 18:40:26.605
  Description: Code Integrity is unable to verify the image integrity of the file \Device\HarddiskVolume1\Users\JOHNSR~1\AppData\Local\Temp\TEMP.^^^\SYMEVENT64x86.SYS because the set of per-page image hashes could not be found on the system.


=========================== Installed Programs ============================

Agere Systems PCI-SV92EX Soft Modem
CCleaner (Version: 3.24)
Diamond Xtreme Audio
Google Chrome (Version: 32.0.1700.107)
HP MediaSmart SmartMenu (Version: 2.1.12)
HP Remote Software (Version: 1.0.5.0)
Intel® Graphics Media Accelerator Driver
Intel® Matrix Storage Manager
LSI PCI-SV92EX Soft Modem (Version: 2.2.100)
magicJack (Version: 2.0.6073.4413)
Microsoft .NET Framework 3.5 SP1
Microsoft .NET Framework 3.5 SP1 (Version: 3.5.30729)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.56336)
Microsoft Visual C++ 2005 Redistributable (x64) (Version: 8.0.61000)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.21022 (Version: 9.0.21022)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729 (Version: 9.0.30729)
SUPERAntiSpyware (Version: 5.7.1018)
ZoneAlarm LTD Toolbar

========================= Devices: ================================


========================= Memory info: ===================================

Percentage of memory in use: 46%
Total physical RAM: 6133.33 MB
Available physical RAM: 3300.38 MB
Total Pagefile: 12379.68 MB
Available Pagefile: 10404.52 MB
Total Virtual: 4095.88 MB
Available Virtual: 3993.9 MB

========================= Partitions: =====================================

1 Drive c: (HP) (Fixed) (Total:582.5 GB) (Free:252.32 GB) NTFS
2 Drive d: (FACTORY_IMAGE) (Fixed) (Total:13.67 GB) (Free:1.89 GB) NTFS

========================= Users: ========================================

User accounts for \\JOHNSR-PC

Administrator            Guest                    John Jr                  
John SR                  


**** End of log ****

MBAM and MBAM ROOTKIT DID NOT FIND ANYTHING
I will have to find the log, that's as far as I got at this sitting.

THanks!



#4 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 20 February 2014 - 02:10 PM

I forgot to say that Spybot is the program that is reporting the BIFROST infection



#5 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,699 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:00 AM

Posted 20 February 2014 - 04:46 PM

My eye sight is OK. No need for mile high letters :)

 

Are you sure about spelling?

Bifrost?

 

p22002970.gif Download Temp File Cleaner (TFC)
Alternate download: http://www.itxassociates.com/OT-Tools/TFC.exe
Double click on TFC.exe to run the program.
Click on Start button to begin cleaning process.
TFC will close all running programs, and it may ask you to restart computer.

p22002970.gif Please download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.


p22002970.gif Please download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.


p22002970.gif Please run a free online scan with the ESET Online Scanner



  • Disable your antivirus program
  • Click on "Run ESET Online Scanner" button.
  • Tick the box next to YES, I accept the Terms of Use
  • Click Start
  • Accept any security warnings from your browser.
  • Check Scan archives
  • Click Start
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click on List of found threats
  • Click on Export to text file , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
    NOTE. If Eset doesn't find any threats it'll NOT produce any log.

Edited by Broni, 20 February 2014 - 04:47 PM.

My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#6 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 20 February 2014 - 07:25 PM

Hi Broni, it's my eyesight that's bad !! so sorry!

here's the spybot log, that was done a few days ago.. I am running another one now, and I'll post that one before I run the new instructions above.

thanks!

 

scan:

Search results from Spybot - Search & Destroy

2/14/2014 4:26:56 PM
Scan took 00:27:15.
33 items found.

Win32.Bifrost: [SBI $745635CC] Settings (Registry Key, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsof

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing
done)

HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet
Settings\User Agent

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing
done)

HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet
Settings\User Agent

MS Direct3D: [SBI $7FB7B83F] Most recent application (Registry Change,
nothing done)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name


MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change,
nothing done)

HKEY_USERS\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication\Nam
e

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change,
nothing done)

HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microso
ft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change,
nothing done)

HKEY_USERS\S-1-5-18\Software\Microsoft\Direct3D\MostRecentApplication\Nam
e

MS DirectDraw: [SBI $EB49D5AF] Most recent application (Registry
Change, nothing done)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Na
me

MS DirectDraw: [SBI $EB49D5AF] Most recent application (Registry
Change, nothing done)

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Na
me

MS DirectInput: [SBI $9A063C91] Most recent application (Registry
Change, nothing done)

HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microso
ft\DirectInput\MostRecentApplication\Name

MS DirectInput: [SBI $7B184199] Most recent application ID (Registry
Change, nothing done)

HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microso
ft\DirectInput\MostRecentApplication\Id

MS Office 9.0 (Script Editor): [SBI $EF84472B] Last opened file
location (Registry Change, nothing done)
HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultFileOpenLocation

MS Office 9.0 (Script Editor): [SBI $EF84472B] Last opened file
location (Registry Change, nothing done)
HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultFileOpenLocation

MS Office 9.0 (Script Editor): [SBI $03609388] Last new project
location (Registry Change, nothing done)

HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultNewProjectLocation

MS Office 9.0 (Script Editor): [SBI $03609388] Last new project
location (Registry Change, nothing done)

HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultNewProjectLocation

MS Office 9.0 (Script Editor): [SBI $A161A438] Last new project item
location (Registry Change, nothing done)

HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultNewProjItemLocation


MS Office 9.0 (Script Editor): [SBI $A161A438] Last new project item
location (Registry Change, nothing done)

HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultNewProjItemLocation


MS Office 9.0 (Script Editor): [SBI $1513A18A] Last opened project
location (Registry Change, nothing done)

HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultOpenProjectLocation


MS Office 9.0 (Script Editor): [SBI $1513A18A] Last opened project
location (Registry Change, nothing done)

HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultOpenProjectLocation


MS Office 9.0 (Script Editor): [SBI $362C89D6] Last opened project item
location (Registry Change, nothing done)

HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultOpenProjItemLocatio
n

MS Office 9.0 (Script Editor): [SBI $362C89D6] Last opened project item
location (Registry Change, nothing done)

HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultOpenProjItemLocatio
n

Windows Explorer: [SBI $2026AFB6] User Assistant history IE (Registry
Key, nothing done)

HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microso
ft\Windows\CurrentVersion\Explorer\UserAssist\{5E6AB780-7743-11CF-A12B-00
AA004AE837}\Count

Windows Explorer: [SBI $6107D172] User Assistant history files
(Registry Key, nothing done)

HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microso
ft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-00
6097DEACF9}\Count

Windows Explorer: [SBI $D20DA0AD] Recent file global history (Registry
Key, nothing done)

HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microso
ft\Windows\CurrentVersion\Explorer\RecentDocs

Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change,
nothing done)
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows
Media\WMSDK\General\ComputerName

Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change,
nothing done)
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows
Media\WMSDK\General\ComputerName

Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing
done)
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows
Media\WMSDK\General\UniqueID

Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing
done)
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows
Media\WMSDK\General\UniqueID

Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry
Value, nothing done)
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows
Media\WMSDK\General\VolumeSerialNumber

Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry
Value, nothing done)
HKEY_USERS\S-1-5-18\Software\Microsoft\Windows
Media\WMSDK\General\VolumeSerialNumber

Cache: [SBI $49804B54] Browser: Cache (3) (Browser: Cache, nothing done)


History: [SBI $49804B54] Browser: History (2) (Browser: History,
nothing done)


Cookie: [SBI $49804B54] Browser: Cookie (37) (Browser: Cookie, nothing
done)



--- Spybot - Search & Destroy version: 2.1.18.131 DLL (build:
20130516) ---

2013-09-20 blindman.exe (2.2.18.151)
2013-09-20 explorer.exe (2.2.18.177)
2013-09-20 SDBootCD.exe (2.2.18.109)
2013-09-20 SDCleaner.exe (2.2.18.110)
2013-09-20 SDDelFile.exe (2.2.18.94)
2013-06-18 SDDisableProxy.exe
2013-09-20 SDFiles.exe (2.2.18.135)
2013-09-20 SDFileScanHelper.exe (2.2.16.1)
2013-10-15 SDFSSvc.exe (2.2.25.211)
2013-10-10 SDHookHelper.exe (2.3.30.2)
2013-10-10 SDHookInst32.exe (2.3.30.2)
2013-10-10 SDHookInst64.exe (2.3.30.2)
2013-09-20 SDImmunize.exe (2.2.18.130)
2013-05-16 SDLogReport.exe (2.1.18.107)
2013-10-14 SDOnAccess.exe (2.2.25.4)
2013-09-20 SDPESetup.exe (2.2.18.3)
2013-09-20 SDPEStart.exe (2.2.18.86)
2013-09-20 SDPhoneScan.exe (2.2.18.28)
2013-09-20 SDPRE.exe (2.2.18.22)
2013-09-20 SDPrepPos.exe (2.2.18.10)
2013-09-20 SDQuarantine.exe (2.2.18.103)
2013-09-20 SDRootAlyzer.exe (2.2.18.116)
2013-09-20 SDSBIEdit.exe (2.2.18.39)
2013-09-20 SDScan.exe (2.2.18.177)
2013-09-20 SDScript.exe (2.2.18.53)
2013-10-15 SDSettings.exe (2.2.25.138)
2013-09-20 SDShell.exe (2.2.18.2)
2013-09-20 SDShred.exe (2.2.18.107)
2013-09-20 SDSysRepair.exe (2.2.18.101)
2013-09-20 SDTools.exe (2.2.18.150)
2013-07-25 SDTray.exe (2.1.21.129)
2013-09-20 SDUpdate.exe (2.2.18.91)
2013-09-20 SDUpdSvc.exe (2.2.18.76)
2013-09-20 SDWelcome.exe (2.2.21.129)
2013-09-13 SDWSCSvc.exe (2.2.22.2)
2013-06-19 spybotsd2-translation-frx.exe
2014-02-13 unins000.exe (51.1052.0.0)
1999-12-02 xcacls.exe
2012-08-23 borlndmm.dll (10.0.2288.42451)
2012-09-05 DelZip190.dll (1.9.0.107)
2012-09-10 libeay32.dll (1.0.0.4)
2012-09-10 libssl32.dll (1.0.0.4)
2013-05-16 SDAdvancedCheckLibrary.dll (2.1.18.98)
2013-05-16 SDAV.dll
2013-05-16 SDECon32.dll (2.1.18.113)
2013-05-16 SDECon64.dll (2.1.18.113)
2013-04-05 SDEvents.dll (2.1.16.2)
2013-10-14 SDFileScanLibrary.dll (2.2.25.14)
2013-10-10 SDHook32.dll (2.3.30.2)
2013-10-10 SDHook64.dll (2.3.30.2)
2013-05-16 SDImmunizeLibrary.dll (2.1.18.2)
2013-05-16 SDLicense.dll (2.1.18.0)
2013-05-16 SDLists.dll (2.1.18.4)
2013-05-16 SDResources.dll (2.1.18.7)
2013-05-16 SDScanLibrary.dll (2.1.18.131)
2013-05-16 SDTasks.dll (2.1.18.15)
2013-05-16 SDWinLogon.dll (2.1.18.0)
2012-08-23 sqlite3.dll
2012-09-10 ssleay32.dll (1.0.0.4)
2013-05-16 Tools.dll (2.1.18.36)
2014-01-08 Includes\Adware-000.sbi (*)
2014-01-08 Includes\Adware-001.sbi (*)
2014-02-12 Includes\Adware-C.sbi (*)
2014-01-13 Includes\Adware.sbi (*)
2014-01-13 Includes\AdwareC.sbi (*)
2010-08-13 Includes\Cookies.sbi (*)
2014-01-08 Includes\Dialer-000.sbi (*)
2014-01-08 Includes\Dialer-001.sbi (*)
2014-01-08 Includes\Dialer-C.sbi (*)
2014-01-13 Includes\Dialer.sbi (*)
2014-01-13 Includes\DialerC.sbi (*)
2012-11-14 Includes\HeavyDuty.sbi (*)
2014-01-08 Includes\Hijackers-000.sbi (*)
2014-01-08 Includes\Hijackers-001.sbi (*)
2014-01-08 Includes\Hijackers-C.sbi (*)
2014-01-13 Includes\Hijackers.sbi (*)
2014-01-13 Includes\HijackersC.sbi (*)
2014-01-08 Includes\iPhone-000.sbi (*)
2014-01-08 Includes\iPhone.sbi (*)
2014-01-08 Includes\Keyloggers-000.sbi (*)
2014-01-08 Includes\Keyloggers-C.sbi (*)
2014-01-13 Includes\Keyloggers.sbi (*)
2014-01-13 Includes\KeyloggersC.sbi (*)
2014-01-09 Includes\Malware-001.sbi (*)
2014-01-09 Includes\Malware-002.sbi (*)
2014-02-05 Includes\Malware-003.sbi (*)
2014-01-28 Includes\Malware-004.sbi (*)
2014-01-09 Includes\Malware-005.sbi (*)
2014-01-09 Includes\Malware-006.sbi (*)
2014-01-09 Includes\Malware-007.sbi (*)
2014-02-12 Includes\Malware-C.sbi (*)
2014-01-13 Includes\Malware.sbi (*)
2013-12-23 Includes\MalwareC.sbi (*)
2014-01-15 Includes\PUPS-000.sbi (*)
2014-01-15 Includes\PUPS-001.sbi (*)
2014-01-15 Includes\PUPS-002.sbi (*)
2014-02-12 Includes\PUPS-C.sbi (*)
2012-11-14 Includes\PUPS.sbi (*)
2014-01-07 Includes\PUPSC.sbi (*)
2014-01-08 Includes\Security-000.sbi (*)
2014-01-08 Includes\Security-C.sbi (*)
2014-01-21 Includes\Security.sbi (*)
2014-01-21 Includes\SecurityC.sbi (*)
2014-01-08 Includes\Spyware-000.sbi (*)
2014-01-08 Includes\Spyware-001.sbi (*)
2014-01-08 Includes\Spyware-C.sbi (*)
2014-01-21 Includes\Spyware.sbi (*)
2014-01-21 Includes\SpywareC.sbi (*)
2011-06-07 Includes\Tracks.sbi (*)
2012-11-19 Includes\Tracks.uti (*)
2014-01-15 Includes\Trojans-000.sbi (*)
2014-01-15 Includes\Trojans-001.sbi (*)
2014-01-15 Includes\Trojans-002.sbi (*)
2014-01-15 Includes\Trojans-003.sbi (*)
2014-01-15 Includes\Trojans-004.sbi (*)
2014-01-15 Includes\Trojans-005.sbi (*)
2014-01-15 Includes\Trojans-006.sbi (*)
2014-01-15 Includes\Trojans-007.sbi (*)
2014-01-15 Includes\Trojans-008.sbi (*)
2014-01-15 Includes\Trojans-009.sbi (*)
2014-02-12 Includes\Trojans-C.sbi (*)
2014-01-15 Includes\Trojans-OG-000.sbi (*)
2014-01-15 Includes\Trojans-TD-000.sbi (*)
2014-01-15 Includes\Trojans-VM-000.sbi (*)
2014-01-15 Includes\Trojans-VM-001.sbi (*)
2014-01-15 Includes\Trojans-VM-002.sbi (*)
2014-01-15 Includes\Trojans-VM-003.sbi (*)
2014-01-15 Includes\Trojans-VM-004.sbi (*)
2014-01-15 Includes\Trojans-VM-005.sbi (*)
2014-01-15 Includes\Trojans-VM-006.sbi (*)
2014-01-15 Includes\Trojans-VM-007.sbi (*)
2014-01-15 Includes\Trojans-VM-008.sbi (*)
2014-01-15 Includes\Trojans-VM-009.sbi (*)
2014-01-15 Includes\Trojans-VM-010.sbi (*)
2014-01-15 Includes\Trojans-VM-011.sbi (*)
2014-01-15 Includes\Trojans-VM-012.sbi (*)
2014-01-15 Includes\Trojans-VM-013.sbi (*)
2014-01-15 Includes\Trojans-VM-014.sbi (*)
2014-01-15 Includes\Trojans-VM-015.sbi (*)
2014-01-15 Includes\Trojans-VM-016.sbi (*)
2014-01-15 Includes\Trojans-VM-017.sbi (*)
2014-01-15 Includes\Trojans-VM-018.sbi (*)
2014-01-15 Includes\Trojans-VM-019.sbi (*)
2014-01-15 Includes\Trojans-VM-020.sbi (*)
2014-01-15 Includes\Trojans-VM-021.sbi (*)
2014-01-15 Includes\Trojans-VM-022.sbi (*)
2014-01-15 Includes\Trojans-VM-023.sbi (*)
2014-01-15 Includes\Trojans-VM-024.sbi (*)
2014-01-15 Includes\Trojans-ZB-000.sbi (*)
2014-01-15 Includes\Trojans-ZL-000.sbi (*)
2014-01-09 Includes\Trojans.sbi (*)
2014-01-16 Includes\TrojansC-01.sbi (*)
2014-01-16 Includes\TrojansC-02.sbi (*)
2014-01-16 Includes\TrojansC-03.sbi (*)
2014-01-16 Includes\TrojansC-04.sbi (*)
2014-01-16 Includes\TrojansC-05.sbi (*)
2014-01-09 Includes\TrojansC.sbi (*)



#7 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,699 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:00 AM

Posted 20 February 2014 - 07:34 PM

Unfortunately Spybot gives only partial path to some registry location:

 

Win32.Bifrost: [SBI $745635CC] Settings (Registry Key, nothing done)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsof

 

 

I'm not a big fan of Spybot as I consider it as a tool of the past.

On a top of it none of our tools indicates anything being wrong so far.

 

For now continue with my previous reply.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#8 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 20 February 2014 - 10:38 PM

Hi Broni,  the only program finding this bifrost is spybot, and yes it used to be good, and ive been out of the scene and didnt know about the new tools and  help available from  BLEEPING COMPUTER.COM. You all rock!

I ran the first 2 progams you suggested and i have one log here, but I lost the JRT log, and I'll have to either find it or run it again,

The ESET Tool is running now, so I'll post that when done. Here's the AD CLEANER  log

 

 

# AdwCleaner v3.019 - Report created 20/02/2014 at 19:37:00
# Updated 17/02/2014 by Xplode
# Operating System : Windows ™ Vista Home Premium Service Pack 2 (64 bits)
# Username : John SR - JOHNSR-PC
# Running from : C:\Users\John SR\Downloads\adwcleaner.exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****

File Found : C:\ProgramData\Microsoft\Windows\Start Menu\Programs\eBay.lnk
File Found : C:\Users\John SR\eBay.lnk
Folder Found C:\Program Files (x86)\BrowserSafeguard
Folder Found C:\ProgramData\Ask
Folder Found C:\ProgramData\Systweak
Folder Found C:\Users\John Jr\AppData\LocalLow\AskToolbar
Folder Found C:\Users\John Jr\AppData\Roaming\CheckPoint\ZoneAlarm LTD Toolbar
Folder Found C:\Users\John SR\AppData\Roaming\CheckPoint\ZoneAlarm LTD Toolbar
Folder Found C:\Users\John SR\AppData\Roaming\Systweak

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{79A765E1-C399-405B-85AF-466F52E918B0}
Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{86D4B82A-ABED-442A-BE86-96357B70F4FE}
Key Found : HKLM\Software\Classes\Installer\Products\A28B4D68DEBAA244EB686953B7074FEF
Key Found : HKLM\SOFTWARE\MozillaPlugins\@checkpoint.com/FFApi
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoneAlarm LTD Toolbar

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16533


-\\ Mozilla Firefox v27.0.1 (en-US)

[ File : C:\Users\John SR\AppData\Roaming\Mozilla\Firefox\Profiles\1i0h0ux7.default\prefs.js ]


-\\ Google Chrome v

[ File : C:\Users\John SR\AppData\Local\Google\Chrome\User Data\Default\preferences ]

Found : homepage
Found : search_url
Found : keyword
Found : homepage
Found : search_url
Found : homepage
Found : search_url
Found : suggest_url

*************************

AdwCleaner[R0].txt - [1925 octets] - [20/02/2014 19:37:00]

########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [1985 octets] ##########



#9 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,699 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:00 AM

Posted 20 February 2014 - 10:50 PM

Re-run JRT when done with Eset.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#10 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 21 February 2014 - 03:21 PM

is this all the text that eset spit out? seems awfully small

 

C:\Users\John SR\Downloads\RegistryEasy_Lite.exe    a variant of Win32/Adware.RegistryEasy application    cleaned by deleting - quarantined

 

new jrt scan today:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.2 (02.20.2014:1)
OS: Windows ™ Vista Home Premium x64
Ran by John SR on Fri 02/21/2014 at 15:02:30.11
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys



~~~ Files



~~~ Folders



~~~ FireFox

Emptied folder: C:\Users\John SR\AppData\Roaming\mozilla\firefox\profiles\1i0h0ux7.default\minidumps [446 files]



~~~ Event Viewer Logs were cleared


new spybot scan log from today:

 

I did find the keys, yes keys, (there were two of them today) in key: : microsof and deleted the whole microsof folder.. was mispelled anyway.. probably some foreigners bad spelling.. I havent rebooted yet, but will do another spybot scan tomorrow, I bet that ESET scan took care of it.

 

heres the spybot scan log:

 

Search results from Spybot - Search & Destroy

2/21/2014 3:13:49 PM
Scan took 00:27:44.
70 items found.

Macromedia.FlashPlayer.Cookies: [SBI $6AA61750]  Text file (File, nothing done)
  C:\Users\John SR\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\DKMGKHUK\my.screenname.aol.com\dp.sol
  Properties.size=75
  Properties.md5=CC9764FD70D176CD985ED6A2B940EDD9
  Properties.filedate=1392953255
  Properties.filedatetext=2014-02-20 22:27:35

Win32.Bifrost: [SBI $0E237542] Settings (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsof

Win32.Bifrost: [SBI $745635CC] Settings (Registry Key, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsof

DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Internet Explorer (Inactive Users): John Jr) (Browser: Cookie, nothing done)
 

DoubleClick: [SBI $4E2AF2AC] Tracking cookie (Internet Explorer (Inactive Users): John Jr) (Browser: Cookie, nothing done)
 

FastClick: [SBI $4E2AF2AC] Tracking cookie (Internet Explorer (Inactive Users): John Jr) (Browser: Cookie, nothing done)
 

BurstMedia: [SBI $4E2AF2AC] Tracking cookie (Internet Explorer (Inactive Users): John Jr) (Browser: Cookie, nothing done)
 

BurstMedia: [SBI $4E2AF2AC] Tracking cookie (Internet Explorer (Inactive Users): John Jr) (Browser: Cookie, nothing done)
 

Right Media: [SBI $4E2AF2AC] Tracking cookie (Internet Explorer (Inactive Users): John Jr) (Browser: Cookie, nothing done)
 

MediaPlex: [SBI $4E2AF2AC] Tracking cookie (Internet Explorer (Inactive Users): John Jr) (Browser: Cookie, nothing done)
 

Internet Explorer: [SBI $1E8157BE] Typed URL list (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Internet Explorer\TypedURLs

Internet Explorer: [SBI $1E8157BE] Typed URL list (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Internet Explorer\TypedURLs

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done)
  HKEY_USERS\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done)
  HKEY_USERS\S-1-5-20\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent

MS Management Console: [SBI $ECD50EAD] Recent command list (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Microsoft Management Console\Recent File List

MS Media Player: [SBI $5C51E349] Client ID (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\MediaPlayer\Player\Settings\Client ID

MS Direct3D: [SBI $7FB7B83F] Most recent application (Registry Change, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-20\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS DirectDraw: [SBI $EB49D5AF] Most recent application (Registry Change, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name

MS DirectDraw: [SBI $EB49D5AF] Most recent application (Registry Change, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name

MS DirectInput: [SBI $9A063C91] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\DirectInput\MostRecentApplication\Name

MS DirectInput: [SBI $7B184199] Most recent application ID (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\DirectInput\MostRecentApplication\Id

MS Office 9.0: [SBI $4F7FBCC4] Internet history (Registry Value, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Office\9.0\Common\Internet\LocationOfComponents

MS Office 9.0: [SBI $DE9A4E33] Access recent file (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Office\9.0\Access\Settings

MS Office 9.0 (Script Editor): [SBI $EF84472B] Last opened file location (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultFileOpenLocation

MS Office 9.0 (Script Editor): [SBI $EF84472B] Last opened file location (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultFileOpenLocation

MS Office 9.0 (Script Editor): [SBI $03609388] Last new project location (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultNewProjectLocation

MS Office 9.0 (Script Editor): [SBI $03609388] Last new project location (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultNewProjectLocation

MS Office 9.0 (Script Editor): [SBI $A161A438] Last new project item location (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultNewProjItemLocation

MS Office 9.0 (Script Editor): [SBI $A161A438] Last new project item location (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultNewProjItemLocation

MS Office 9.0 (Script Editor): [SBI $1513A18A] Last opened project location (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultOpenProjectLocation

MS Office 9.0 (Script Editor): [SBI $1513A18A] Last opened project location (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultOpenProjectLocation

MS Office 9.0 (Script Editor): [SBI $362C89D6] Last opened project item location (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\MSE\9.0\DefaultOpenProjItemLocation

MS Office 9.0 (Script Editor): [SBI $362C89D6] Last opened project item location (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\MSE\9.0\DefaultOpenProjItemLocation

MS Office 9.0 (Word): [SBI $EC31BB71] Recently used file list (Registry Value, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Office\9.0\Word\Data\Settings

Windows Explorer: [SBI $7308A845] Run history (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU

Windows Explorer: [SBI $2026AFB6] User Assistant history IE (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{5E6AB780-7743-11CF-A12B-00AA004AE837}\Count

Windows Explorer: [SBI $2026AFB6] User Assistant history IE (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{5E6AB780-7743-11CF-A12B-00AA004AE837}\Count

Windows Explorer: [SBI $6107D172] User Assistant history files (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count

Windows Explorer: [SBI $6107D172] User Assistant history files (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count

Windows Explorer: [SBI $D20DA0AD] Recent file global history (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs

Windows Explorer: [SBI $D20DA0AD] Recent file global history (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs

Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\Windows Media\WMSDK\General\ComputerName

Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change, nothing done)
  HKEY_USERS\S-1-5-20\Software\Microsoft\Windows Media\WMSDK\General\ComputerName

Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Windows Media\WMSDK\General\ComputerName

Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Windows Media\WMSDK\General\ComputerName

Windows Media SDK: [SBI $37AAEDE6] Computer name (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\Windows Media\WMSDK\General\ComputerName

Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\Windows Media\WMSDK\General\UniqueID

Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing done)
  HKEY_USERS\S-1-5-20\Software\Microsoft\Windows Media\WMSDK\General\UniqueID

Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Windows Media\WMSDK\General\UniqueID

Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Windows Media\WMSDK\General\UniqueID

Windows Media SDK: [SBI $CAA58B6E] Unique ID (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\Windows Media\WMSDK\General\UniqueID

Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry Value, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\Windows Media\WMSDK\General\VolumeSerialNumber

Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry Value, nothing done)
  HKEY_USERS\S-1-5-20\Software\Microsoft\Windows Media\WMSDK\General\VolumeSerialNumber

Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry Value, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Windows Media\WMSDK\General\VolumeSerialNumber

Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry Value, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsoft\Windows Media\WMSDK\General\VolumeSerialNumber

Windows Media SDK: [SBI $BACCD0DA] Volume serial number (Registry Value, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\Windows Media\WMSDK\General\VolumeSerialNumber

Cookie: [SBI $49804B54] Browser: Cookie (1) (Browser: Cookie, nothing done)
 

Cache: [SBI $49804B54] Browser: Cache (46) (Browser: Cache, nothing done)
 

History: [SBI $49804B54] Browser: History (9) (Browser: History, nothing done)
 

Cookie: [SBI $49804B54] Browser: Cookie (102) (Browser: Cookie, nothing done)
 

History: [SBI $49804B54] Browser: History (32) (Browser: History, nothing done)
 

Cookie: [SBI $49804B54] Browser: Cookie (31) (Browser: Cookie, nothing done)
 


--- Spybot - Search & Destroy version: 2.1.18.131  DLL (build: 20130516) ---

2013-09-20 blindman.exe (2.2.18.151)
2013-09-20 explorer.exe (2.2.18.177)
2013-09-20 SDBootCD.exe (2.2.18.109)
2013-09-20 SDCleaner.exe (2.2.18.110)
2013-09-20 SDDelFile.exe (2.2.18.94)
2013-06-18 SDDisableProxy.exe
2013-09-20 SDFiles.exe (2.2.18.135)
2013-09-20 SDFileScanHelper.exe (2.2.16.1)
2013-10-15 SDFSSvc.exe (2.2.25.211)
2013-10-10 SDHookHelper.exe (2.3.30.2)
2013-10-10 SDHookInst32.exe (2.3.30.2)
2013-10-10 SDHookInst64.exe (2.3.30.2)
2013-09-20 SDImmunize.exe (2.2.18.130)
2013-05-16 SDLogReport.exe (2.1.18.107)
2013-10-14 SDOnAccess.exe (2.2.25.4)
2013-09-20 SDPESetup.exe (2.2.18.3)
2013-09-20 SDPEStart.exe (2.2.18.86)
2013-09-20 SDPhoneScan.exe (2.2.18.28)
2013-09-20 SDPRE.exe (2.2.18.22)
2013-09-20 SDPrepPos.exe (2.2.18.10)
2013-09-20 SDQuarantine.exe (2.2.18.103)
2013-09-20 SDRootAlyzer.exe (2.2.18.116)
2013-09-20 SDSBIEdit.exe (2.2.18.39)
2013-09-20 SDScan.exe (2.2.18.177)
2013-09-20 SDScript.exe (2.2.18.53)
2013-10-15 SDSettings.exe (2.2.25.138)
2013-09-20 SDShell.exe (2.2.18.2)
2013-09-20 SDShred.exe (2.2.18.107)
2013-09-20 SDSysRepair.exe (2.2.18.101)
2013-09-20 SDTools.exe (2.2.18.150)
2013-07-25 SDTray.exe (2.1.21.129)
2013-09-20 SDUpdate.exe (2.2.18.91)
2013-09-20 SDUpdSvc.exe (2.2.18.76)
2013-09-20 SDWelcome.exe (2.2.21.129)
2013-09-13 SDWSCSvc.exe (2.2.22.2)
2013-06-19 spybotsd2-translation-frx.exe
2014-02-13 unins000.exe (51.1052.0.0)
1999-12-02 xcacls.exe
2012-08-23 borlndmm.dll (10.0.2288.42451)
2012-09-05 DelZip190.dll (1.9.0.107)
2012-09-10 libeay32.dll (1.0.0.4)
2012-09-10 libssl32.dll (1.0.0.4)
2013-05-16 SDAdvancedCheckLibrary.dll (2.1.18.98)
2013-05-16 SDAV.dll
2013-05-16 SDECon32.dll (2.1.18.113)
2013-05-16 SDECon64.dll (2.1.18.113)
2013-04-05 SDEvents.dll (2.1.16.2)
2013-10-14 SDFileScanLibrary.dll (2.2.25.14)
2013-10-10 SDHook32.dll (2.3.30.2)
2013-10-10 SDHook64.dll (2.3.30.2)
2013-05-16 SDImmunizeLibrary.dll (2.1.18.2)
2013-05-16 SDLicense.dll (2.1.18.0)
2013-05-16 SDLists.dll (2.1.18.4)
2013-05-16 SDResources.dll (2.1.18.7)
2013-05-16 SDScanLibrary.dll (2.1.18.131)
2013-05-16 SDTasks.dll (2.1.18.15)
2013-05-16 SDWinLogon.dll (2.1.18.0)
2012-08-23 sqlite3.dll
2012-09-10 ssleay32.dll (1.0.0.4)
2013-05-16 Tools.dll (2.1.18.36)
2014-01-08 Includes\Adware-000.sbi (*)
2014-01-08 Includes\Adware-001.sbi (*)
2014-02-19 Includes\Adware-C.sbi (*)
2014-01-13 Includes\Adware.sbi (*)
2014-01-13 Includes\AdwareC.sbi (*)
2010-08-13 Includes\Cookies.sbi (*)
2014-01-08 Includes\Dialer-000.sbi (*)
2014-01-08 Includes\Dialer-001.sbi (*)
2014-01-08 Includes\Dialer-C.sbi (*)
2014-01-13 Includes\Dialer.sbi (*)
2014-01-13 Includes\DialerC.sbi (*)
2012-11-14 Includes\HeavyDuty.sbi (*)
2014-01-08 Includes\Hijackers-000.sbi (*)
2014-01-08 Includes\Hijackers-001.sbi (*)
2014-01-08 Includes\Hijackers-C.sbi (*)
2014-01-13 Includes\Hijackers.sbi (*)
2014-01-13 Includes\HijackersC.sbi (*)
2014-01-08 Includes\iPhone-000.sbi (*)
2014-01-08 Includes\iPhone.sbi (*)
2014-01-08 Includes\Keyloggers-000.sbi (*)
2014-01-08 Includes\Keyloggers-C.sbi (*)
2014-01-13 Includes\Keyloggers.sbi (*)
2014-01-13 Includes\KeyloggersC.sbi (*)
2014-01-09 Includes\Malware-001.sbi (*)
2014-01-09 Includes\Malware-002.sbi (*)
2014-02-05 Includes\Malware-003.sbi (*)
2014-01-28 Includes\Malware-004.sbi (*)
2014-01-09 Includes\Malware-005.sbi (*)
2014-01-09 Includes\Malware-006.sbi (*)
2014-01-09 Includes\Malware-007.sbi (*)
2014-02-19 Includes\Malware-C.sbi (*)
2014-01-13 Includes\Malware.sbi (*)
2013-12-23 Includes\MalwareC.sbi (*)
2014-01-15 Includes\PUPS-000.sbi (*)
2014-01-15 Includes\PUPS-001.sbi (*)
2014-01-15 Includes\PUPS-002.sbi (*)
2014-02-19 Includes\PUPS-C.sbi (*)
2012-11-14 Includes\PUPS.sbi (*)
2014-01-07 Includes\PUPSC.sbi (*)
2014-01-08 Includes\Security-000.sbi (*)
2014-01-08 Includes\Security-C.sbi (*)
2014-01-21 Includes\Security.sbi (*)
2014-01-21 Includes\SecurityC.sbi (*)
2014-01-08 Includes\Spyware-000.sbi (*)
2014-01-08 Includes\Spyware-001.sbi (*)
2014-01-08 Includes\Spyware-C.sbi (*)
2014-01-21 Includes\Spyware.sbi (*)
2014-01-21 Includes\SpywareC.sbi (*)
2011-06-07 Includes\Tracks.sbi (*)
2012-11-19 Includes\Tracks.uti (*)
2014-01-15 Includes\Trojans-000.sbi (*)
2014-01-15 Includes\Trojans-001.sbi (*)
2014-01-15 Includes\Trojans-002.sbi (*)
2014-01-15 Includes\Trojans-003.sbi (*)
2014-01-15 Includes\Trojans-004.sbi (*)
2014-01-15 Includes\Trojans-005.sbi (*)
2014-01-15 Includes\Trojans-006.sbi (*)
2014-01-15 Includes\Trojans-007.sbi (*)
2014-01-15 Includes\Trojans-008.sbi (*)
2014-01-15 Includes\Trojans-009.sbi (*)
2014-02-19 Includes\Trojans-C.sbi (*)
2014-01-15 Includes\Trojans-OG-000.sbi (*)
2014-01-15 Includes\Trojans-TD-000.sbi (*)
2014-01-15 Includes\Trojans-VM-000.sbi (*)
2014-01-15 Includes\Trojans-VM-001.sbi (*)
2014-01-15 Includes\Trojans-VM-002.sbi (*)
2014-01-15 Includes\Trojans-VM-003.sbi (*)
2014-01-15 Includes\Trojans-VM-004.sbi (*)
2014-01-15 Includes\Trojans-VM-005.sbi (*)
2014-01-15 Includes\Trojans-VM-006.sbi (*)
2014-01-15 Includes\Trojans-VM-007.sbi (*)
2014-01-15 Includes\Trojans-VM-008.sbi (*)
2014-01-15 Includes\Trojans-VM-009.sbi (*)
2014-01-15 Includes\Trojans-VM-010.sbi (*)
2014-01-15 Includes\Trojans-VM-011.sbi (*)
2014-01-15 Includes\Trojans-VM-012.sbi (*)
2014-01-15 Includes\Trojans-VM-013.sbi (*)
2014-01-15 Includes\Trojans-VM-014.sbi (*)
2014-01-15 Includes\Trojans-VM-015.sbi (*)
2014-01-15 Includes\Trojans-VM-016.sbi (*)
2014-01-15 Includes\Trojans-VM-017.sbi (*)
2014-01-15 Includes\Trojans-VM-018.sbi (*)
2014-01-15 Includes\Trojans-VM-019.sbi (*)
2014-01-15 Includes\Trojans-VM-020.sbi (*)
2014-01-15 Includes\Trojans-VM-021.sbi (*)
2014-01-15 Includes\Trojans-VM-022.sbi (*)
2014-01-15 Includes\Trojans-VM-023.sbi (*)
2014-01-15 Includes\Trojans-VM-024.sbi (*)
2014-01-15 Includes\Trojans-ZB-000.sbi (*)
2014-01-15 Includes\Trojans-ZL-000.sbi (*)
2014-01-09 Includes\Trojans.sbi (*)
2014-01-16 Includes\TrojansC-01.sbi (*)
2014-01-16 Includes\TrojansC-02.sbi (*)
2014-01-16 Includes\TrojansC-03.sbi (*)
2014-01-16 Includes\TrojansC-04.sbi (*)
2014-01-16 Includes\TrojansC-05.sbi (*)
2014-01-09 Includes\TrojansC.sbi (*)
 
Scan Results.140221-1513.txt

1 of 1


#11 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,699 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:00 AM

Posted 21 February 2014 - 03:44 PM

As I said before both registry paths are incomplete so I have no idea where they're leading to.

 

How is computer doing anyway?

 

p22002970.gif Update Adobe Flash Player: http://get.adobe.com/flashplayer/
Make sure you UN-check Yes, install McAfee Security Scan Plus

NOTE 1: Beginning with Adobe Flash Version 11.3, the universal installer includes the 32-bit and 64-bit versions of the Flash Player.
NOTE 2: While installing make sure you UN-check any extra garbage which wants to install alongside.

 

p22002970.gif Update Adobe Reader

You can download it from http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions (if present).
Note. If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.

 

p22002970.gif 1. Update your Java version here: http://www.java.com/en/download/manual.jsp
Alternate download: http://www.filehippo.com/search?q=java

Note 1: UNCHECK any pre-checked toolbar and/or software offered with the Java update. The pre-checked toolbars/software are not part of the Java update.

Note 2: If you're running 64-bit system make sure you install BOTH, 32-bit and 64-bit Java.

Note 3: The Java Quick Starter (JQS.exe) adds a service to improve the initial startup time of Java applets and applications. If you don't want to run another extra service, go to Start > Control Panel > Java > Advanced > Miscellaneous and uncheck the box for Java Quick Starter. Click OK and restart your computer.

2. Now, we need to remove old Java version and its remnants...

Download JavaRa to your desktop and unzip it.

  • Run JavaRa.exe (Vista and 7 users! Right click on JavaRa.exe, click Run As Administrator), pick the language of your choice and click Select. Then click Remove Older Versions.
  • Accept any prompts.
  • Do NOT post JavaRa log.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#12 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 23 February 2014 - 04:07 PM

Broni, I think between the last JRT scan and Ert or what ever that one was,  the infection is now gone.

I did delete these keys: (actually I deleted the whole Microsof folder as described below.

 

Win32.Bifrost: [SBI $0E237542] Settings (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsof

Win32.Bifrost: [SBI $745635CC] Settings (Registry Key, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsof

 

I then rescanned the computer with spybot and there is no longer any Bifrost detected. It may have been a bogus thing that spybot concocted, but I wanted to be safe with my Dad's computer. The computer is running very fast as it should be with the processing power and the amount of ram it has installed.

Thank you, very much for your help with this, I'll try to donate something, money is tight right now so it won't be gold, but HIGH FIVE to you and your team!

Thanks again Broni!

 

search results from Spybot - Search & Destroy

2/23/2014 11:35:11 AM
Scan took 00:30:13.
45 items found.

Macromedia.FlashPlayer.Cookies: [SBI $6AA61750]  Text file (File, nothing done)
  C:\Users\John SR\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\DKMGKHUK\my.screenname.aol.com\dp.sol
  Properties.size=75
  Properties.md5=CC9764FD70D176CD985ED6A2B940EDD9
  Properties.filedate=1392953255
  Properties.filedatetext=2014-02-20 22:27:35

MS Office 9.0: [SBI $4E2AF2AC] Recently used files  (3 files) (Directory, nothing done)
  C:\Users\John SR\AppData\Roaming\Microsoft\Office\Recent\
  Directory.subfile=C:\Users\John SR\AppData\Roaming\Microsoft\Office\Recent\Documents.LNK
  Directory.subfile.size=705
  Directory.subfile.md5=08D13452218E7E9D53AA3DB399C9B123
  Directory.subfile.filedate=1393119880
  Directory.subfile.filedatetext=2014-02-22 20:44:39
  Directory.subfile=C:\Users\John SR\AppData\Roaming\Microsoft\Office\Recent\index.dat
  Directory.subfile.size=77
  Directory.subfile.md5=7AD9D3CDB2BA61BD606A37CE788FF6CD
  Directory.subfile.filedate=1393119880
  Directory.subfile.filedatetext=2014-02-22 20:44:39
  Directory.subfile=C:\Users\John SR\AppData\Roaming\Microsoft\Office\Recent\YOUR WORK IS NEVER DONE! -Poem.doc.LNK
  Directory.subfile.size=948
  Directory.subfile.md5=6BD3A196BAE80EDEE08C7C2CEB14BA5A
  Directory.subfile.filedate=1393119880
  Directory.subfile.filedatetext=2014-02-22 20:44:39

Internet Explorer: [SBI $1E8157BE] Typed URL list (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Internet Explorer\TypedURLs

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent

Internet Explorer: [SBI $0BC7B918] User agent (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent

MS Management Console: [SBI $ECD50EAD] Recent command list (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Microsoft Management Console\Recent File List

MS Media Player: [SBI $E48560B4] Recent file list (Registry Key, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\MediaPlayer\Player\RecentFileList

MS Direct3D: [SBI $7FB7B83F] Most recent application (Registry Change, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS Direct3D: [SBI $C2A44980] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-18\Software\Microsoft\Direct3D\MostRecentApplication\Name

MS DirectDraw: [SBI $EB49D5AF] Most recent application (Registry Change, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name

MS DirectDraw: [SBI $EB49D5AF] Most recent application (Registry Change, nothing done)
  HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\DirectDraw\MostRecentApplication\Name

MS DirectInput: [SBI $9A063C91] Most recent application (Registry Change, nothing done)
  HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1000\Software\Microsoft\DirectInput\MostRecentApplication\Name

MS DirectInput: [SBI $7B184199] Most recent application ID (Registry Change, nothing done)



#13 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 23 February 2014 - 04:12 PM

One other thing Broni,

What security software would you recommend to stop problems like this from occuring. I seem to have come across a lot of conduit browser hijacking on several computers that I have been asked to look at by my relatives.  The software wouldnt necessarily need to be free, just  need for it  to keep computer safe, even with novice people  operating the computers ! Thanks



#14 Broni

Broni

    The Coolest BC Computer


  • BC Advisor
  • 42,699 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Daly City, CA
  • Local time:01:00 AM

Posted 23 February 2014 - 06:08 PM

I'm not sure about those registry keys you deleted.

 

When you went here:

HKEY_USERS\S-1-5-21-670819545-1279240186-1419955333-1001\Software\Microsof

did you actually see misspelled "microsof" folder?

I thought that Spybot log was simply cutting off "t" letter at the end.

Let me know.


My Website

p4433470.gif

My help doesn't cost a penny, but if you'd like to consider a donation, click p22001735.gif


 


#15 The Seeker of Truth

The Seeker of Truth
  • Topic Starter

  • Members
  • 9 posts
  • OFFLINE
  •  
  • Local time:03:00 AM

Posted 23 February 2014 - 07:26 PM

Yes, I am sure, it was the same mispelling when I went to the actual key, so, I deleted the whole folder, (there werent but 3 small entries inside the folder), and the computer seems to be running fast as it should again.

Thanks Broni.. what about the recommended security software?






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users