Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malwarebytes Disabled - Software Restriction Policy Rootkit?


  • This topic is locked This topic is locked
19 replies to this topic

#1 DrDonkeyKong

DrDonkeyKong

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 11 March 2014 - 10:10 AM

Hi

 

I need help as my PC is infected - normally I am very good at removing viruses but this one has me stumped. Malwarebytes will not open nor Hi-Jack This as PC states a software violation. I did find a Rookit a few days back and thought it had been removed. Also double-clicking icons with left mouse button on the desktop does not allow items to open - not sure if this is part of the issue.

 

I apprecite your help.

 

MY DDS LOG

 

DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 8.0.6001.18702  BrowserJavaVersion: 10.51.2
Run by Bongo at 14:50:32 on 2014-03-11
Microsoft Windows XP Home Edition  5.1.2600.3.1251.7.1033.18.3327.2407 [GMT 0:00]
.
AV: Lavasoft Ad-Watch Live! Anti-Virus *Enabled/Updated* {A1C4F2E0-7FDE-4917-AFAE-013EFC3EDE33}
.
============== Running Processes ================
.
C:\WINDOWS\system32\Ati2evxx.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\rundll32.exe
C:\WINDOWS\system32\Ati2evxx.exe
C:\Program Files\SUPERAntiSpyware\SASCORE.EXE
C:\Program Files\Common Files\ArcSoft\Connection Service\Bin\ACService.exe
C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
C:\Program Files\Bonjour\mDNSResponder.exe
C:\WINDOWS\system32\FsUsbExService.Exe
C:\Program Files\Java\jre7\bin\jqs.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
C:\Documents and Settings\All Users\Application Data\Skype\Toolbars\Skype C2C Service\c2c_service.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\PixArt\PAC7302\Monitor.exe
C:\Program Files\Unlocker\UnlockerAssistant.exe
C:\WINDOWS\system32\ctfmon.exe
c:\Program Files\ATI Technologies\ATI.ACE\Core-Static\MOM.exe
c:\Program Files\ATI Technologies\ATI.ACE\Core-Static\ccc.exe
C:\Program Files\iPod\bin\iPodService.exe
C:\Program Files\Mozilla Firefox\firefox.exe
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Internet Explorer\IEXPLORE.EXE
C:\Program Files\Mozilla Firefox\plugin-container.exe
C:\WINDOWS\system32\wbem\wmiprvse.exe
C:\WINDOWS\system32\svchost.exe -k DcomLaunch
C:\WINDOWS\system32\svchost.exe -k rpcss
C:\WINDOWS\System32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k WudfServiceGroup
C:\WINDOWS\system32\svchost.exe -k NetworkService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k LocalService
C:\WINDOWS\system32\svchost.exe -k netsvcs
C:\WINDOWS\system32\svchost.exe -k imgsvc
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com
uDefault_Page_URL = hxxp://www.google.com
mStart Page = hxxp://www.google.com
mDefault_Page_URL = hxxp://www.google.com
BHO: Adobe PDF Reader Link Helper: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dll
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Spybot-S&D IE Protection: {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
BHO: {5C255C8A-E604-49b4-9D64-90988571CECB} - <orphaned>
BHO: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Windows Live Sign-in Helper: {9030D464-4C02-4ABF-8ECC-5164760863C6} - c:\program files\common files\microsoft shared\windows live\WindowsLiveLogin.dll
BHO: Skype Browser Helper: {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
uRun: [IBP] <no file>
mRun: [PAC7302_Monitor] c:\windows\pixart\pac7302\Monitor.exe
mRun: [NeroFilterCheck] c:\windows\system32\NeroCheck.exe
mRun: [ArcSoft Connection Service] c:\program files\common files\arcsoft\connection service\bin\ACDaemon.exe
mRun: [StartCCC] "c:\program files\ati technologies\ati.ace\core-static\CLIStart.exe" MSRun
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [NPSStartup] <no file>
dRun: [CTFMON.EXE] c:\windows\system32\CTFMON.EXE
StartupFolder: c:\documents and settings\bongo\start menu\programs\startup\EPUHelp.exe
uPolicies-Explorer: NoDriveTypeAutoRun = dword:323
uPolicies-Explorer: New Value #1 = dword:0
uPolicies-Explorer: New Value #2 = dword:0
uPolicies-Explorer: TaskbarNoNotification = dword:0
uPolicies-Explorer: HideSCAHealth = dword:0
uPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: TaskbarNoNotification = dword:0
mPolicies-Explorer: HideSCAHealth = dword:0
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveTypeAutoRun = dword:323
mPolicies-Explorer: NoDriveAutoRun = dword:67108863
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {2EAF5BB1-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\program files\microsoft activesync\INetRepl.dll
IE: {2EAF5BB2-070F-11D3-9307-00C04FAE2D4F} - {2EAF5BB0-070F-11D3-9307-00C04FAE2D4F} - c:\program files\microsoft activesync\INetRepl.dll
IE: {7578ADEA-D65F-4C89-A249-B1C88B6FFC20} - c:\program files\icq7.5\ICQ.exe
IE: {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
IE: {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - {53707962-6F74-2D53-2644-206D7942484F} - c:\program files\spybot - search & destroy\SDHelper.dll
IE: {e2e2dd38-d088-4134-82b7-f2ba38496583} - %windir%\Network Diagnostic\xpnetdiag.exe
IE: {FB5F1910-F110-11d2-BB9E-00C04F795683} - c:\program files\messenger\msmsgs.exe
LSP: c:\windows\system32\PCProtect.dll
LSP: mswsock.dll
.
INFO: HKCU has more than 50 listed domains.
If you wish to scan all of them, select the 'Force scan all domains' option.
.
.
INFO: HKLM has more than 50 listed domains.
   If you wish to scan all of them, select the 'Force scan all domains' option.
.
TCP: NameServer = 192.168.1.254
TCP: Interfaces\{F9CC826A-A95B-4DD6-B35A-BCE68FECB2D1} : DHCPNameServer = 192.168.1.254
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Handler: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - c:\program files\skype\toolbars\internet explorer\skypeieplugin.dll
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\program files\common files\skype\Skype4COM.dll
Notify: AtiExtEvent - Ati2evxx.dll
SSODL: WPDShServiceObj - {AAA288BA-9A4C-45B0-95D7-94D524869DB5} - c:\windows\system32\WPDShServiceObj.dll
SEH: Groove GFS Stub Execution Hook - {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
SEH: SABShellExecuteHook Class - {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - c:\program files\superantispyware\SASSEH.DLL
LSA: Authentication Packages =  msv1_0 yaawxx.dll
Hosts: 127.0.0.1    www.spywareinfo.com
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\documents and settings\bongo\application data\mozilla\firefox\profiles\am443jhi.default-1375731191937\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com
FF - plugin: c:\documents and settings\bongo\application data\mozilla\plugins\npgoogletalk.dll
FF - plugin: c:\documents and settings\bongo\application data\mozilla\plugins\npgtpo3dautoplugin.dll
FF - plugin: c:\documents and settings\bongo\application data\mozilla\plugins\npo1d.dll
FF - plugin: c:\documents and settings\bongo\local settings\application data\google\update\1.3.22.5\npGoogleUpdate3.dll
FF - plugin: c:\program files\adobe\reader 9.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\google\google earth\plugin\npgeplugin.dll
FF - plugin: c:\program files\google\picasa3\npPicasa3.dll
FF - plugin: c:\program files\google\update\1.3.22.5\npGoogleUpdate3.dll
FF - plugin: c:\program files\java\jre7\bin\dtplugin\npdeployJava1.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\microsoft silverlight\4.1.10329.0\npctrlui.dll
FF - plugin: c:\program files\nokia\nokia suite\npNokiaSuiteEnabler.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_7_700_224.dll
.
---- FIREFOX POLICIES ----
! c r y p t e d !   2 C E 4 A B 1 D A A C C D 1 C 9 E E 7 F 0 8 F A B E 1 D 6 F 0 5   GAў›TT~Н;w1ц·EІ^µ±Ї¤rDїнpв¬w№v‡76РMJ_ьi¦€т·ЋзРNБшт:®uBЏ-У›—$'ZVбbµTmШЅзЂ‘™ђбвхM(rЩша0ЉЊДу¤ъЉ‡&БfЄиЕ]a    kwє0±яуfНhИfu Ы‚Е±^0ЪT##aљ”€t€5MжГQ?‡›Hкћ—Џ6ЏЦk„О'ф=к¦°N'Сѓ*йOQ,Tц
N3рE4дyЏo—r”рЦЇє›PҐ¤]эђ¦NЇАсВ(9№еУ»rr9CДю.2V™WбUщнъ®:ЦђТх­
============= SERVICES / DRIVERS ===============
.
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [2009-9-29 64512]
R1 SASDIFSV;SASDIFSV;c:\program files\superantispyware\SASDIFSV.SYS [2009-9-15 12880]
R1 SASKUTIL;SASKUTIL;c:\program files\superantispyware\SASKUTIL.SYS [2009-9-15 67664]
R2 !SASCORE;SAS Core Service;c:\program files\superantispyware\SASCORE.EXE [2010-9-6 116608]
R2 FsUsbExService;FsUsbExService;c:\windows\system32\FsUsbExService.Exe [2013-4-23 238952]
R2 MBAMScheduler;MBAMScheduler;c:\program files\malwarebytes' anti-malware\mbamscheduler.exe [2012-11-18 418376]
R2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2009-12-3 701512]
R2 Skype C2C Service;Skype C2C Service;c:\documents and settings\all users\application data\skype\toolbars\skype c2c service\c2c_service.exe [2013-10-9 3275136]
R3 ArcSoftKsUFilter;ArcSoft Magic-I Visual Effect;c:\windows\system32\drivers\ArcSoftKsUFilter.sys [2010-12-17 14336]
R3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [2013-4-23 36608]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2009-12-3 22856]
S0 mivgkpvq;mivgkpvq;c:\windows\system32\drivers\alagwvs.sys --> c:\windows\system32\drivers\alagwvs.sys [?]
S1 iSafeNetFilter;iSafeNetFilter;\??\c:\program files\isafe\isafenetfilter.sys --> c:\program files\isafe\iSafeNetFilter.sys [?]
S1 SBRE;SBRE;\??\c:\windows\system32\drivers\sbredrv.sys --> c:\windows\system32\drivers\SBREdrv.sys [?]
S2 ca82e1a5;Optimizer Pro Crash Monitor;c:\windows\system32\rundll32.exe [2008-4-14 33280]
S2 ProtectMonitor;Protect Monitor;C:\monitorsvc.exe [2014-2-13 34244]
S2 SkypeUpdate;Skype Updater;c:\program files\skype\updater\Updater.exe [2013-6-21 162408]
S2 syshost32;syshost32;"c:\windows\installer\{06b7b360-8806-c2f3-236b-7fc00319d8a1}\syshost.exe" /service --> c:\windows\installer\{06b7b360-8806-c2f3-236b-7fc00319d8a1}\syshost.exe [?]
S3 ALSysIO;ALSysIO;\??\c:\docume~1\bongo\locals~1\temp\alsysio.sys --> c:\docume~1\bongo\locals~1\temp\ALSysIO.sys [?]
S3 ATHFMWDL;NETGEAR WG111T bootloader driver;c:\windows\system32\drivers\Athfmwdl.sys [2009-8-4 43392]
S3 DNINDIS5;DNINDIS5 NDIS Protocol Driver;c:\windows\system32\DNINDIS5.sys [2009-8-4 17149]
S3 hitmanpro35;Hitman Pro 3.5 Support Driver;c:\windows\system32\drivers\hitmanpro35.sys [2010-9-11 23624]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\lavasoft\ad-aware\kernexplorer.sys --> c:\program files\lavasoft\ad-aware\KernExplorer.sys [?]
S3 NPF;Netgroup Packet Filter;c:\windows\system32\drivers\npf.sys [2009-12-3 42512]
S3 Revoflt;Revoflt;c:\windows\system32\drivers\revoflt.sys [2012-9-6 27064]
S3 SASENUM;SASENUM;c:\program files\superantispyware\SASENUM.SYS [2009-9-15 12872]
S3 ss_bbus;SAMSUNG USB Mobile Device (WDM);c:\windows\system32\drivers\ss_bbus.sys [2013-4-23 98432]
S3 ss_bmdfl;SAMSUNG USB Mobile Modem (Filter);c:\windows\system32\drivers\ss_bmdfl.sys [2013-4-23 14848]
S3 ss_bmdm;SAMSUNG USB Mobile Modem;c:\windows\system32\drivers\ss_bmdm.sys [2013-4-23 123648]
S3 ss_bserd;SAMSUNG USB Mobile Logging Driver;c:\windows\system32\drivers\ss_bserd.sys [2013-4-23 100224]
.
=============== File Associations ===============
.
FileExt: .js: jsfile="c:\program files\adobe\adobe dreamweaver cs4\Dreamweaver.exe","%1"
ShellExec: dreamweaver.exe: Open="c:\program files\adobe\adobe dreamweaver cs4\dreamweaver.exe", "%1"
.
=============== Created Last 30 ================
.
2014-03-09 20:41:39    --------    d-----w-    c:\windows\system32\MRT
2014-03-09 20:40:26    --------    d-----w-    c:\windows\ie8updates
2014-03-09 20:34:24    247808    -c----w-    c:\windows\system32\dllcache\ieproxy.dll
2014-03-09 20:34:23    12800    -c----w-    c:\windows\system32\dllcache\xpshims.dll
2014-03-09 20:34:22    743424    -c----w-    c:\windows\system32\dllcache\iedvtool.dll
2014-03-09 20:34:17    522240    -c----w-    c:\windows\system32\dllcache\jsdbgui.dll
2014-03-09 20:31:29    5376    -c----w-    c:\windows\system32\dllcache\usbd.sys
2014-03-09 20:31:29    32384    -c----w-    c:\windows\system32\dllcache\usbccgp.sys
2014-03-09 20:31:29    30336    -c----w-    c:\windows\system32\dllcache\usbehci.sys
2014-03-09 20:31:29    144128    -c----w-    c:\windows\system32\dllcache\usbport.sys
2014-03-09 20:17:57    --------    d-----w-    c:\program files\MSXML 4.0
2014-03-09 19:34:52    98816    ----a-w-    c:\windows\sed.exe
2014-03-09 19:34:52    256000    ----a-w-    c:\windows\PEV.exe
2014-03-09 19:34:52    208896    ----a-w-    c:\windows\MBR.exe
2014-03-09 19:26:24    --------    d-----w-    C:\FRST
2014-03-08 14:12:04    --------    d-----w-    c:\documents and settings\bongo\application data\{D9309E38-1298-4D90-9341-676ADB3688CC}
2014-03-08 09:00:02    --------    d-----w-    c:\program files\Unlocker
2014-03-07 23:36:56    --------    d-----w-    c:\documents and settings\bongo\application data\right
2014-03-07 23:36:41    --------    d-----w-    c:\documents and settings\bongo\application data\{E60A54F7-2D3F-49DD-901A-0B5645D47FD9}
2014-03-06 20:10:31    --------    d-----w-    c:\documents and settings\bongo\application data\eCyber
2014-03-06 20:09:42    --------    d-----w-    c:\documents and settings\bongo\application data\iSafe
2014-03-04 21:44:02    --------    d-----w-    c:\program files\SuperFastPC
2014-03-04 21:38:43    293984    ----a-w-    c:\windows\system32\PCProtect.dll
2014-03-04 21:38:32    --------    d-----w-    c:\program files\Web Protect
2014-03-04 21:15:19    --------    d-----w-    c:\windows\system32\wbem\repository\FS
2014-03-04 21:15:19    --------    d-----w-    c:\windows\system32\wbem\Repository
2014-03-04 21:03:39    --------    d-----w-    c:\program files\Womble Multimedia
2014-02-28 16:52:43    --------    d-----w-    c:\documents and settings\all users\application data\hlw
2014-02-27 14:08:10    --------    d-----w-    c:\program files\HTC
2014-02-27 14:06:56    --------    d-----w-    C:\Temp
2014-02-13 13:43:24    34244    ----a-w-    C:\monitorsvc.exe
2014-02-11 21:29:52    --------    d-----w-    c:\documents and settings\bongo\local settings\application data\Trusteer
2014-02-11 21:29:44    --------    d-----w-    c:\program files\Trusteer
2014-02-11 21:25:04    --------    d-----w-    c:\documents and settings\all users\application data\Trusteer
2014-02-11 08:12:25    --------    d-----w-    c:\documents and settings\bongo\application data\Qidae
.
==================== Find3M  ====================
.
2014-02-05 23:26:52    920064    ----a-w-    c:\windows\system32\wininet.dll
2014-02-05 23:26:43    43520    ----a-w-    c:\windows\system32\licmgr10.dll
2014-02-05 23:26:42    1469440    ----a-w-    c:\windows\system32\inetcpl.cpl
2014-02-05 23:26:37    18944    ----a-w-    c:\windows\system32\corpol.dll
2014-02-05 22:24:05    385024    ----a-w-    c:\windows\system32\html.iec
2014-01-06 19:23:36    4558848    ----a-w-    c:\windows\system32\GPhotos.scr
2014-01-04 03:13:05    420864    ----a-w-    c:\windows\system32\vbscript.dll
2013-12-18 21:10:01    94632    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
2013-12-18 20:46:50    145408    ----a-w-    c:\windows\system32\javacpl.cpl
.
============= FINISH: 14:51:12.45 ===============
 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:29 AM

Posted 11 March 2014 - 10:44 AM


Hello DrDonkeyKong

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 DrDonkeyKong

DrDonkeyKong
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 11 March 2014 - 11:35 AM

Hi Gringo,

 

Thanks for the fast reply!

 

Here are the reports as requested:

 

Adwcleaner:

# AdwCleaner v3.021 - Report created 11/03/2014 at 16:18:20
# Updated 10/03/2014 by Xplode
# Operating System : Microsoft Windows XP Service Pack 3 (32 bits)
# Username : Bongo - BONGOPANTS
# Running from : C:\Documents and Settings\Bongo\My Documents\Downloads\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

[#] Service Deleted : ca82e1a5
[#] Service Deleted : iSafeNetFilter

***** [ Files / Folders ] *****

Folder Deleted : C:\Program Files\iMesh Applications
Folder Deleted : C:\Program Files\Web Protect
Folder Deleted : C:\Documents and Settings\Bongo\Local Settings\Application Data\PackageAware
Folder Deleted : C:\Documents and Settings\Bongo\Application Data\eCyber
Folder Deleted : C:\Documents and Settings\Bongo\Application Data\Mozilla\Firefox\Profiles\e19kjj4h.Johnski\Extensions\{635abd67-4fe9-1b23-4f01-e679fa7484c1}
File Deleted : C:\Documents and Settings\Bongo\Application Data\Mozilla\Firefox\Profiles\e19kjj4h.Johnski\.autoreg
File Deleted : C:\Documents and Settings\Bongo\Application Data\Mozilla\Firefox\Profiles\am443jhi.default-1375731191937\invalidprefs.js

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{64697678-0000-0010-8000-00AA00389B71}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BCFF5F55-6F44-11D2-86F8-00104B265ED5}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{64697678-0000-0010-8000-00AA00389B71}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{AE805869-2E5C-4ED4-8F7B-F1F7851A4497}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKCU\Software\ICQ\ICQToolbar
Key Deleted : HKCU\Software\Imesh
Key Deleted : HKCU\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\Software\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\Software\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Deleted : HKLM\Software\{6791A2F3-FC80-475C-A002-C014AF797E9C}
Key Deleted : HKLM\Software\ICQ\ICQToolbar
Key Deleted : HKLM\Software\iMeshSRTB
Key Deleted : HKLM\Software\Trymedia Systems
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\imeshtoolbarguid
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Optimizer Pro_is1

***** [ Browsers ] *****

-\\ Internet Explorer v8.0.6001.18702


-\\ Mozilla Firefox v27.0.1 (en-US)

[ File : C:\Documents and Settings\Bongo\Application Data\Mozilla\Firefox\Profiles\1xahcjcs.default\prefs.js ]


[ File : C:\Documents and Settings\Bongo\Application Data\Mozilla\Firefox\Profiles\am443jhi.default-1375731191937\prefs.js ]


[ File : C:\Documents and Settings\Bongo\Application Data\Mozilla\Firefox\Profiles\e19kjj4h.Johnski\prefs.js ]


[ File : C:\Documents and Settings\Bongo\Application Data\Mozilla\Firefox\Profiles\y1sg28ut.default\prefs.js ]


[ File : C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\cz3fdz32.default\prefs.js ]


[ File : C:\Documents and Settings\Administrator\Application Data\Mozilla\Firefox\Profiles\les4042c.default\prefs.js ]


-\\ Google Chrome v

[ File : C:\Documents and Settings\Bongo\Local Settings\Application Data\Google\Chrome\User Data\Default\preferences ]


*************************

AdwCleaner[R0].txt - [3997 octets] - [11/03/2014 16:17:20]
AdwCleaner[S0].txt - [3994 octets] - [11/03/2014 16:18:20]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [4054 octets] ##########
 

JRT:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.2 (02.20.2014:1)
OS: Microsoft Windows XP x86
Ran by Bongo on 11/03/2014 at 16:29:32.57
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values



~~~ Registry Keys



~~~ Files



~~~ Folders





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 11/03/2014 at 16:33:01.15
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:29 AM

Posted 11 March 2014 - 12:21 PM


Hello DrDonkeyKong

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 DrDonkeyKong

DrDonkeyKong
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 11 March 2014 - 01:36 PM

Hi

 

I ran Combofix and it said I had LavaSoft Ad-Watch Live installed which I don't. It then ran and restarted my PC but I can no locate the Combofix LoG File anywhere



#6 DrDonkeyKong

DrDonkeyKong
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 11 March 2014 - 03:01 PM

I am just re-installing Ad-Aware and then I'll remove it see if this helps...



#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:29 AM

Posted 11 March 2014 - 03:11 PM

shutoff what you can and go ahead and run it


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 DrDonkeyKong

DrDonkeyKong
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 11 March 2014 - 04:06 PM

Adawre is still there apparently... according to Combofix and MS Security Centre

 

Combofix deletes a system 32 fuile and then restarts the PC, but no log-file



#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:29 AM

Posted 11 March 2014 - 05:05 PM


Hello DrDonkeyKong

Ok lets try this, I want you to run combofix in safe mode but it is very important that when combofix reboots the computer for you to direct it back into safe mode so it can finish the scan.

Boot into Safe Mode

Reboot your computer in Safe Mode.
  • If the computer is running, shut down Windows, and then turn off the power.
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a "keyboard error" message. To resolve this, restart the computer and try again.
  • Ensure that the Safe Mode option is selected.
  • Press Enter. The computer then begins to start in Safe mode.
  • Login on your usual account.
after combofix has finished its scan please post the report back here.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 DrDonkeyKong

DrDonkeyKong
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 11 March 2014 - 05:54 PM

Result!

 

ComboFix 14-03-10.01 - Bongo 11/03/2014  22:26:48.6.4 - x86 MINIMAL
Microsoft Windows XP Home Edition  5.1.2600.3.1251.7.1033.18.3327.2984 [GMT 0:00]
Running from: c:\documents and settings\Bongo\Desktop\ComboFix.exe
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\documents and settings\All Users\Application Data\df02.pad
c:\documents and settings\All Users\Application Data\e0roc.pad
c:\documents and settings\All Users\Application Data\iwqejz6.pad
c:\documents and settings\All Users\Application Data\TEMP
c:\documents and settings\Bongo\.COMMgr
c:\documents and settings\Bongo\Application Data\right
c:\documents and settings\Bongo\Application Data\right\cgminer.exe
c:\documents and settings\Bongo\Application Data\right\libcurl-4.dll
c:\documents and settings\Bongo\Application Data\right\minerd.exe
c:\documents and settings\Bongo\Application Data\right\phatk121016.cl
c:\documents and settings\Bongo\Application Data\right\poclbm130302.cl
c:\documents and settings\Bongo\Application Data\right\pthreadGC2.dll
c:\documents and settings\Bongo\Application Data\right\scrypt130511.cl
c:\documents and settings\Bongo\Application Data\right\zlib1.dll
c:\documents and settings\Bongo\Local Settings\Application Data\fipyvdel.log
c:\documents and settings\Bongo\Local Settings\Application Data\xcijxipq.log
c:\documents and settings\Bongo\Start Menu\Programs\Windows Scan
c:\documents and settings\Bongo\Start Menu\Programs\Windows Scan\Uninstall Windows Scan.lnk
c:\documents and settings\Bongo\Start Menu\Programs\Windows Scan\Windows Scan.lnk
c:\program files\Internet Explorer\SETA8.tmp
c:\program files\Internet Explorer\SETAC.tmp
c:\program files\Internet Explorer\SETAD.tmp
c:\windows\system32\Packet.dll
c:\windows\system32\SET5C.tmp
c:\windows\system32\SETC3.tmp
c:\windows\system32\SETC4.tmp
c:\windows\system32\SETC5.tmp
c:\windows\system32\SETC6.tmp
c:\windows\system32\SETC7.tmp
c:\windows\system32\SETC8.tmp
c:\windows\system32\SETC9.tmp
c:\windows\system32\SETCA.tmp
c:\windows\system32\SETCB.tmp
c:\windows\system32\SETCE.tmp
c:\windows\system32\SETCF.tmp
c:\windows\system32\SETD0.tmp
c:\windows\system32\SETD1.tmp
c:\windows\system32\SETD2.tmp
c:\windows\system32\SETD3.tmp
c:\windows\system32\SETD5.tmp
c:\windows\system32\SETD6.tmp
c:\windows\system32\SETD7.tmp
c:\windows\system32\SETD8.tmp
c:\windows\system32\SETD9.tmp
c:\windows\system32\SETDA.tmp
c:\windows\system32\SETDB.tmp
c:\windows\system32\SETDD.tmp
c:\windows\system32\SETDE.tmp
c:\windows\system32\SETDF.tmp
c:\windows\system32\SETE0.tmp
c:\windows\system32\SETE1.tmp
c:\windows\system32\SETE2.tmp
c:\windows\system32\SETE3.tmp
c:\windows\system32\SETE4.tmp
c:\windows\system32\SETE5.tmp
c:\windows\system32\SETE6.tmp
c:\windows\system32\SETE8.tmp
c:\windows\system32\SETE9.tmp
c:\windows\system32\SETEA.tmp
c:\windows\system32\SETEB.tmp
c:\windows\system32\SETEC.tmp
c:\windows\system32\SETED.tmp
c:\windows\system32\SETEF.tmp
c:\windows\system32\SETF0.tmp
c:\windows\system32\SETF1.tmp
c:\windows\system32\SETF2.tmp
c:\windows\system32\SETF3.tmp
c:\windows\system32\SETF4.tmp
c:\windows\system32\SETF5.tmp
c:\windows\system32\SETF6.tmp
c:\windows\system32\SETF7.tmp
c:\windows\system32\SETF8.tmp
c:\windows\system32\wpcap.dll
c:\windows\XSxS
.
.
(((((((((((((((((((((((((((((((((((((((   Drivers/Services   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
-------\Legacy_NPF
-------\Legacy_SYSHOST32
-------\Service_NPF
-------\Service_syshost32
.
.
(((((((((((((((((((((((((   Files Created from 2014-02-11 to 2014-03-11  )))))))))))))))))))))))))))))))
.
.
2014-03-11 22:15 . 2014-03-11 22:15    --------    d-----w-    c:\windows\LastGood
2014-03-11 20:08 . 2014-03-11 20:08    --------    d-----w-    c:\documents and settings\Bongo\Application Data\LavasoftStatistics
2014-03-11 19:45 . 2014-03-11 19:45    --------    d-----w-    c:\documents and settings\All Users\Application Data\Lavasoft
2014-03-11 16:17 . 2014-03-11 21:17    --------    d-----w-    C:\AdwCleaner
2014-03-09 20:47 . 2013-07-03 02:12    25088    -c----w-    c:\windows\system32\dllcache\hidparse.sys
2014-03-09 20:41 . 2014-03-09 20:48    --------    d-----w-    c:\windows\system32\MRT
2014-03-09 20:40 . 2014-03-09 20:40    --------    d-----w-    c:\windows\ie8updates
2014-03-09 20:34 . 2014-02-05 23:26    247808    -c----w-    c:\windows\system32\dllcache\ieproxy.dll
2014-03-09 20:34 . 2014-02-05 23:26    12800    -c----w-    c:\windows\system32\dllcache\xpshims.dll
2014-03-09 20:34 . 2014-02-05 23:26    743424    -c----w-    c:\windows\system32\dllcache\iedvtool.dll
2014-03-09 20:34 . 2014-02-05 23:26    522240    -c----w-    c:\windows\system32\dllcache\jsdbgui.dll
2014-03-09 20:31 . 2013-08-09 00:55    144128    -c----w-    c:\windows\system32\dllcache\usbport.sys
2014-03-09 20:31 . 2013-08-09 00:55    32384    -c----w-    c:\windows\system32\dllcache\usbccgp.sys
2014-03-09 20:31 . 2013-08-09 00:55    5376    -c----w-    c:\windows\system32\dllcache\usbd.sys
2014-03-09 20:31 . 2009-03-18 11:02    30336    -c----w-    c:\windows\system32\dllcache\usbehci.sys
2014-03-09 20:17 . 2014-03-09 20:17    --------    d-----w-    c:\program files\MSXML 4.0
2014-03-09 19:26 . 2014-03-09 19:43    --------    d-----w-    C:\FRST
2014-03-08 14:12 . 2014-03-08 14:12    --------    d-----w-    c:\documents and settings\Bongo\Application Data\{D9309E38-1298-4D90-9341-676ADB3688CC}
2014-03-08 09:00 . 2014-03-08 09:03    --------    d-----w-    c:\program files\Unlocker
2014-03-07 23:36 . 2014-03-07 23:36    --------    d-----w-    c:\documents and settings\Bongo\Application Data\{E60A54F7-2D3F-49DD-901A-0B5645D47FD9}
2014-03-04 21:44 . 2014-03-04 21:44    --------    d-----w-    c:\program files\SuperFastPC
2014-03-04 21:38 . 2014-01-08 06:08    293984    ----a-w-    c:\windows\system32\PCProtect.dll
2014-03-04 21:15 . 2014-03-04 21:15    --------    d-----w-    c:\windows\system32\wbem\Repository
2014-03-04 21:03 . 2014-03-04 21:03    --------    d-----w-    c:\program files\Womble Multimedia
2014-02-28 16:52 . 2014-02-28 16:52    --------    d-----w-    c:\documents and settings\All Users\Application Data\hlw
2014-02-27 14:08 . 2014-03-04 20:54    --------    d-----w-    c:\program files\HTC
2014-02-27 14:06 . 2014-02-27 14:07    --------    d-----w-    C:\Temp
2014-02-19 19:55 . 2014-02-19 19:55    --------    d-sh--w-    c:\documents and settings\Default User\IETldCache
2014-02-13 13:43 . 2014-02-13 13:43    34244    ----a-w-    C:\monitorsvc.exe
2014-02-11 21:29 . 2014-02-11 21:29    --------    d-----w-    c:\documents and settings\Bongo\Local Settings\Application Data\Trusteer
2014-02-11 21:29 . 2014-02-11 21:29    --------    d-----w-    c:\program files\Trusteer
2014-02-11 21:25 . 2014-02-11 21:25    --------    d-----w-    c:\documents and settings\All Users\Application Data\Trusteer
2014-02-11 08:12 . 2014-02-11 20:59    --------    d-----w-    c:\documents and settings\Bongo\Application Data\Qidae
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-02-05 23:26 . 2008-04-14 12:00    920064    ----a-w-    c:\windows\system32\wininet.dll
2014-02-05 23:26 . 2008-04-14 12:00    43520    ----a-w-    c:\windows\system32\licmgr10.dll
2014-02-05 23:26 . 2008-04-14 12:00    1469440    ----a-w-    c:\windows\system32\inetcpl.cpl
2014-02-05 23:26 . 2008-04-14 12:00    18944    ----a-w-    c:\windows\system32\corpol.dll
2014-02-05 22:24 . 2008-04-14 12:00    385024    ----a-w-    c:\windows\system32\html.iec
2014-01-28 21:58 . 2014-01-28 21:58    73728    ----a-r-    c:\documents and settings\Bongo\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe1_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2014-01-28 21:58 . 2014-01-28 21:58    73728    ----a-r-    c:\documents and settings\Bongo\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2014-01-28 21:58 . 2014-01-28 21:58    73728    ----a-r-    c:\documents and settings\Bongo\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\ARPPRODUCTICON.exe
2014-01-06 19:23 . 2014-01-06 19:23    4558848    ----a-w-    c:\windows\system32\GPhotos.scr
2014-01-04 03:13 . 2008-04-14 12:00    420864    ----a-w-    c:\windows\system32\vbscript.dll
2013-12-18 21:10 . 2014-01-20 10:32    94632    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
2013-12-18 20:46 . 2014-01-20 10:32    145408    ----a-w-    c:\windows\system32\javacpl.cpl
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\1MediaIconsOverlay]
@="{1EC23CFF-4C58-458f-924C-8519AEF61B32}"
[HKEY_CLASSES_ROOT\CLSID\{1EC23CFF-4C58-458f-924C-8519AEF61B32}]
2013-04-30 17:33    225280    ----a-w-    c:\program files\x264 Video Codec\Filters\Haali\mmdinfo.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2013-06-21 19875432]
"ICQ"="c:\program files\ICQ7.5\ICQ.exe" [2011-08-01 124480]
"Google+ Auto Backup"="c:\program files\Google\Google+ Auto Backup\Google+ Auto Backup.exe" [2014-01-06 3619096]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PAC7302_Monitor"="c:\windows\PixArt\PAC7302\Monitor.exe" [2006-11-03 319488]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2010-10-27 207424]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-11-25 98304]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-07 421160]
"UnlockerAssistant"="c:\program files\Unlocker\UnlockerAssistant.exe" [2010-07-04 17408]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
.
c:\documents and settings\Bongo\Start Menu\Programs\Startup\
EPUHelp.exe [2014-3-6 266240]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"TaskbarNoNotification"= 0 (0x0)
"HideSCAHealth"= 0 (0x0)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"New Value #1"= 0 (0x0)
"New Value #2"= 0 (0x0)
"TaskbarNoNotification"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-09-14 113024]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [29/09/2009 18:40 64512]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [06/09/2010 06:48 116608]
S0 mivgkpvq;mivgkpvq;c:\windows\system32\drivers\alagwvs.sys --> c:\windows\system32\drivers\alagwvs.sys [?]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [15/09/2009 10:42 12880]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [15/09/2009 10:42 67664]
S1 SBRE;SBRE;\??\c:\windows\system32\drivers\SBREdrv.sys --> c:\windows\system32\drivers\SBREdrv.sys [?]
S2 FsUsbExService;FsUsbExService;c:\windows\system32\FsUsbExService.Exe [23/04/2013 20:35 238952]
S2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes' Anti-Malware\mbamscheduler.exe [18/11/2012 19:09 418376]
S2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [03/12/2009 16:17 701512]
S2 ProtectMonitor;Protect Monitor;C:\monitorsvc.exe [13/02/2014 13:43 34244]
S2 Skype C2C Service;Skype C2C Service;c:\documents and settings\All Users\Application Data\Skype\Toolbars\Skype C2C Service\c2c_service.exe [09/10/2013 10:58 3275136]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [21/06/2013 08:53 162408]
S3 ALSysIO;ALSysIO;\??\c:\docume~1\Bongo\LOCALS~1\Temp\ALSysIO.sys --> c:\docume~1\Bongo\LOCALS~1\Temp\ALSysIO.sys [?]
S3 ArcSoftKsUFilter;ArcSoft Magic-I Visual Effect;c:\windows\system32\drivers\ArcSoftKsUFilter.sys [17/12/2010 20:08 14336]
S3 ATHFMWDL;NETGEAR WG111T bootloader driver;c:\windows\system32\drivers\Athfmwdl.sys [04/08/2009 11:01 43392]
S3 DNINDIS5;DNINDIS5 NDIS Protocol Driver;c:\windows\system32\DNINDIS5.sys [04/08/2009 11:01 17149]
S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [23/04/2013 20:35 36608]
S3 hitmanpro35;Hitman Pro 3.5 Support Driver;c:\windows\system32\drivers\hitmanpro35.sys [11/09/2010 04:05 23624]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys --> c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys [?]
S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [03/12/2009 16:17 22856]
S3 Pcouffin;Low level access layer for CD devices;c:\windows\system32\drivers\Pcouffin.sys [20/11/2010 18:21 47616]
S3 Revoflt;Revoflt;c:\windows\system32\drivers\revoflt.sys [06/09/2012 17:18 27064]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [15/09/2009 10:42 12872]
S3 ss_bbus;SAMSUNG USB Mobile Device (WDM);c:\windows\system32\drivers\ss_bbus.sys [23/04/2013 20:35 98432]
S3 ss_bmdfl;SAMSUNG USB Mobile Modem (Filter);c:\windows\system32\drivers\ss_bmdfl.sys [23/04/2013 20:35 14848]
S3 ss_bmdm;SAMSUNG USB Mobile Modem;c:\windows\system32\drivers\ss_bmdm.sys [23/04/2013 20:35 123648]
S3 ss_bserd;SAMSUNG USB Mobile Logging Driver;c:\windows\system32\drivers\ss_bserd.sys [23/04/2013 20:35 100224]
.
Contents of the 'Scheduled Tasks' folder
.
2014-03-11 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-03-23 09:30]
.
2014-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-14 14:15]
.
2014-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-14 14:15]
.
2014-03-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-220523388-1801674531-1004Core.job
- c:\documents and settings\Bongo\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-03-24 20:26]
.
2014-03-11 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-220523388-1801674531-1004UA.job
- c:\documents and settings\Bongo\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-03-24 20:26]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: {{7578ADEA-D65F-4C89-A249-B1C88B6FFC20} - c:\program files\ICQ7.5\ICQ.exe
LSP: c:\windows\system32\PCProtect.dll
TCP: DhcpNameServer = 192.168.1.254
FF - ProfilePath - c:\documents and settings\Bongo\Application Data\Mozilla\Firefox\Profiles\am443jhi.default-1375731191937\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com
.
- - - - ORPHANS REMOVED - - - -
.
HKCU-Run-IBP - (no file)
HKLM-Run-NPSStartup - (no file)
SafeBoot-07525043.sys
SafeBoot-12487332.sys
SafeBoot-37017023.sys
SafeBoot-39171415.sys
SafeBoot-64383401.sys
SafeBoot-klmdb.sys
SafeBoot-WudfPf
SafeBoot-WudfRd
SafeBoot-Lavasoft Ad-Aware Service
AddRemove-01_Simmental - c:\program files\Samsung\USB Drivers\01_Simmental\Uninstall.exe
AddRemove-02_Siberian - c:\program files\Samsung\USB Drivers\02_Siberian\Uninstall.exe
AddRemove-03_Swallowtail - c:\program files\Samsung\USB Drivers\03_Swallowtail\Uninstall.exe
AddRemove-04_semseyite - c:\program files\Samsung\USB Drivers\04_semseyite\Uninstall.exe
AddRemove-05_Sloan - c:\program files\Samsung\USB Drivers\05_Sloan\Uninstall.exe
AddRemove-06_Spencer - c:\program files\Samsung\USB Drivers\06_Spencer\Uninstall.exe
AddRemove-07_Schorl - c:\program files\Samsung\USB Drivers\07_Schorl\Uninstall.exe
AddRemove-08_EMPChipset - c:\program files\Samsung\USB Drivers\08_EMPChipset\Uninstall.exe
AddRemove-09_Hsp - c:\program files\Samsung\USB Drivers\09_Hsp\Uninstall.exe
AddRemove-11_HSP_Plus_Default - c:\program files\Samsung\USB Drivers\11_HSP_Plus_Default\Uninstall.exe
AddRemove-16_Shrewsbury - c:\program files\Samsung\USB Drivers\16_Shrewsbury\Uninstall.exe
AddRemove-17_EMP_Chipset2 - c:\program files\Samsung\USB Drivers\17_EMP_Chipset2\Uninstall.exe
AddRemove-18_Zinia_Serial_Driver - c:\program files\Samsung\USB Drivers\18_Zinia_Serial_Driver\Uninstall.exe
AddRemove-19_VIA_driver - c:\program files\Samsung\USB Drivers\19_VIA_driver\Uninstall.exe
AddRemove-20_NXP_Driver - c:\program files\Samsung\USB Drivers\20_NXP_Driver\Uninstall.exe
AddRemove-21_Searsburg - c:\program files\Samsung\USB Drivers\21_Searsburg\Uninstall.exe
AddRemove-22_WiBro_WiMAX - c:\program files\Samsung\USB Drivers\22_WiBro_WiMAX\Uninstall.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-03-11 22:45
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_8_800_94_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_8_800_94_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(240)
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\atiadlxx.dll
.
- - - - - - - > 'explorer.exe'(1436)
c:\windows\system32\WININET.dll
c:\program files\x264 Video Codec\Filters\Haali\mmdinfo.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\MSVCR80.dll
c:\windows\system32\PCProtect.dll
c:\windows\system32\hnetcfg.dll
.
Completion time: 2014-03-11  22:50:39 - machine was rebooted
ComboFix-quarantined-files.txt  2014-03-11 22:50
.
Pre-Run: 68,671,258,624 bytes free
Post-Run: 68,919,795,712 bytes free
.
- - End Of File - - 9C059855F91D7FD80D8EB5A1385F103B
8F558EB6672622401DA993E1E865C861
 



#11 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:29 AM

Posted 11 March 2014 - 09:26 PM


Hello DrDonkeyKong

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache::


 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#12 DrDonkeyKong

DrDonkeyKong
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 12 March 2014 - 03:10 PM

Hi Gringo,

Had to run Combofix in safemode again to get a posted log:

 

ComboFix 14-03-10.01 - Bongo 12/03/2014  19:49:47.8.4 - x86 MINIMAL
Microsoft Windows XP Home Edition  5.1.2600.3.1251.7.1033.18.3327.2984 [GMT 0:00]
Running from: c:\documents and settings\Bongo\Desktop\ComboFix.exe
Command switches used :: c:\documents and settings\Bongo\Desktop\CFScript.txt
.
.
(((((((((((((((((((((((((   Files Created from 2014-02-12 to 2014-03-12  )))))))))))))))))))))))))))))))
.
.
2014-03-11 23:12 . 2014-03-11 23:12    --------    d-----w-    c:\program files\MSLab
2014-03-11 20:08 . 2014-03-11 20:08    --------    d-----w-    c:\documents and settings\Bongo\Application Data\LavasoftStatistics
2014-03-11 19:45 . 2014-03-11 19:45    --------    d-----w-    c:\documents and settings\All Users\Application Data\Lavasoft
2014-03-11 16:17 . 2014-03-11 21:17    --------    d-----w-    C:\AdwCleaner
2014-03-09 20:47 . 2013-07-03 02:12    25088    -c----w-    c:\windows\system32\dllcache\hidparse.sys
2014-03-09 20:41 . 2014-03-09 20:48    --------    d-----w-    c:\windows\system32\MRT
2014-03-09 20:40 . 2014-03-09 20:40    --------    d-----w-    c:\windows\ie8updates
2014-03-09 20:34 . 2014-02-24 11:45    247808    -c----w-    c:\windows\system32\dllcache\ieproxy.dll
2014-03-09 20:34 . 2014-02-24 11:46    12800    -c----w-    c:\windows\system32\dllcache\xpshims.dll
2014-03-09 20:34 . 2014-02-24 11:45    743424    -c----w-    c:\windows\system32\dllcache\iedvtool.dll
2014-03-09 20:34 . 2014-02-24 11:45    522240    -c----w-    c:\windows\system32\dllcache\jsdbgui.dll
2014-03-09 20:31 . 2013-08-09 00:55    144128    -c----w-    c:\windows\system32\dllcache\usbport.sys
2014-03-09 20:31 . 2013-08-09 00:55    32384    -c----w-    c:\windows\system32\dllcache\usbccgp.sys
2014-03-09 20:31 . 2013-08-09 00:55    5376    -c----w-    c:\windows\system32\dllcache\usbd.sys
2014-03-09 20:31 . 2009-03-18 11:02    30336    -c----w-    c:\windows\system32\dllcache\usbehci.sys
2014-03-09 20:17 . 2014-03-09 20:17    --------    d-----w-    c:\program files\MSXML 4.0
2014-03-09 19:26 . 2014-03-09 19:43    --------    d-----w-    C:\FRST
2014-03-08 14:12 . 2014-03-08 14:12    --------    d-----w-    c:\documents and settings\Bongo\Application Data\{D9309E38-1298-4D90-9341-676ADB3688CC}
2014-03-08 09:00 . 2014-03-08 09:03    --------    d-----w-    c:\program files\Unlocker
2014-03-07 23:36 . 2014-03-07 23:36    --------    d-----w-    c:\documents and settings\Bongo\Application Data\{E60A54F7-2D3F-49DD-901A-0B5645D47FD9}
2014-03-04 21:44 . 2014-03-04 21:44    --------    d-----w-    c:\program files\SuperFastPC
2014-03-04 21:38 . 2014-01-08 06:08    293984    ----a-w-    c:\windows\system32\PCProtect.dll
2014-03-04 21:15 . 2014-03-04 21:15    --------    d-----w-    c:\windows\system32\wbem\Repository
2014-03-04 21:03 . 2014-03-04 21:03    --------    d-----w-    c:\program files\Womble Multimedia
2014-02-28 16:52 . 2014-02-28 16:52    --------    d-----w-    c:\documents and settings\All Users\Application Data\hlw
2014-02-27 14:08 . 2014-03-04 20:54    --------    d-----w-    c:\program files\HTC
2014-02-27 14:06 . 2014-02-27 14:07    --------    d-----w-    C:\Temp
2014-02-19 19:55 . 2014-02-19 19:55    --------    d-sh--w-    c:\documents and settings\Default User\IETldCache
2014-02-13 13:43 . 2014-02-13 13:43    34244    ----a-w-    C:\monitorsvc.exe
2014-02-11 21:29 . 2014-02-11 21:29    --------    d-----w-    c:\documents and settings\Bongo\Local Settings\Application Data\Trusteer
2014-02-11 21:29 . 2014-02-11 21:29    --------    d-----w-    c:\program files\Trusteer
2014-02-11 21:25 . 2014-02-11 21:25    --------    d-----w-    c:\documents and settings\All Users\Application Data\Trusteer
2014-02-11 08:12 . 2014-02-11 20:59    --------    d-----w-    c:\documents and settings\Bongo\Application Data\Qidae
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-02-24 11:46 . 2008-04-14 12:00    920064    ----a-w-    c:\windows\system32\wininet.dll
2014-02-24 11:45 . 2008-04-14 12:00    43520    ----a-w-    c:\windows\system32\licmgr10.dll
2014-02-24 11:45 . 2008-04-14 12:00    1469440    ----a-w-    c:\windows\system32\inetcpl.cpl
2014-02-24 11:45 . 2008-04-14 12:00    18944    ----a-w-    c:\windows\system32\corpol.dll
2014-02-24 10:54 . 2008-04-14 12:00    385024    ----a-w-    c:\windows\system32\html.iec
2014-02-07 02:01 . 2008-04-14 12:00    1879040    ----a-w-    c:\windows\system32\win32k.sys
2014-02-05 08:55 . 2008-04-14 12:00    562688    ----a-w-    c:\windows\system32\qedit.dll
2014-01-28 21:58 . 2014-01-28 21:58    73728    ----a-r-    c:\documents and settings\Bongo\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe1_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2014-01-28 21:58 . 2014-01-28 21:58    73728    ----a-r-    c:\documents and settings\Bongo\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\SVRTgui.exe_810EDD9E2F0A4E2BACF86673C38D9F48.exe
2014-01-28 21:58 . 2014-01-28 21:58    73728    ----a-r-    c:\documents and settings\Bongo\Application Data\Microsoft\Installer\{B829E117-D072-41EA-9606-9826A38D34C1}\ARPPRODUCTICON.exe
2014-01-06 19:23 . 2014-01-06 19:23    4558848    ----a-w-    c:\windows\system32\GPhotos.scr
2014-01-04 03:13 . 2008-04-14 12:00    420864    ----a-w-    c:\windows\system32\vbscript.dll
2013-12-18 21:10 . 2014-01-20 10:32    94632    ----a-w-    c:\windows\system32\WindowsAccessBridge.dll
2013-12-18 20:46 . 2014-01-20 10:32    145408    ----a-w-    c:\windows\system32\javacpl.cpl
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\1MediaIconsOverlay]
@="{1EC23CFF-4C58-458f-924C-8519AEF61B32}"
[HKEY_CLASSES_ROOT\CLSID\{1EC23CFF-4C58-458f-924C-8519AEF61B32}]
2013-04-30 17:33    225280    ----a-w-    c:\program files\x264 Video Codec\Filters\Haali\mmdinfo.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2013-06-21 19875432]
"ICQ"="c:\program files\ICQ7.5\ICQ.exe" [2011-08-01 124480]
"Google+ Auto Backup"="c:\program files\Google\Google+ Auto Backup\Google+ Auto Backup.exe" [2014-01-06 3619096]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"PAC7302_Monitor"="c:\windows\PixArt\PAC7302\Monitor.exe" [2006-11-03 319488]
"NeroFilterCheck"="c:\windows\system32\NeroCheck.exe" [2001-07-09 155648]
"ArcSoft Connection Service"="c:\program files\Common Files\ArcSoft\Connection Service\Bin\ACDaemon.exe" [2010-10-27 207424]
"StartCCC"="c:\program files\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2010-11-25 98304]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2011-03-07 421160]
"UnlockerAssistant"="c:\program files\Unlocker\UnlockerAssistant.exe" [2010-07-04 17408]
.
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run]
"CTFMON.EXE"="c:\windows\system32\CTFMON.EXE" [2008-04-14 15360]
.
c:\documents and settings\Bongo\Start Menu\Programs\Startup\
EPUHelp.exe [2014-3-6 266240]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\explorer]
"TaskbarNoNotification"= 0 (0x0)
"HideSCAHealth"= 0 (0x0)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"New Value #1"= 0 (0x0)
"New Value #2"= 0 (0x0)
"TaskbarNoNotification"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2011-09-14 113024]
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MSIServer]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile]
"EnableFirewall"= 0 (0x0)
.
[HKLM\~\services\sharedaccess\parameters\firewallpolicy\standardprofile\AuthorizedApplications\List]
"%windir%\\system32\\sessmgr.exe"=
.
R0 Lbd;Lbd;c:\windows\system32\drivers\Lbd.sys [29/09/2009 18:40 64512]
R2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [06/09/2010 06:48 116608]
S0 mivgkpvq;mivgkpvq;c:\windows\system32\drivers\alagwvs.sys --> c:\windows\system32\drivers\alagwvs.sys [?]
S1 SASDIFSV;SASDIFSV;c:\program files\SUPERAntiSpyware\SASDIFSV.SYS [15/09/2009 10:42 12880]
S1 SASKUTIL;SASKUTIL;c:\program files\SUPERAntiSpyware\SASKUTIL.SYS [15/09/2009 10:42 67664]
S1 SBRE;SBRE;\??\c:\windows\system32\drivers\SBREdrv.sys --> c:\windows\system32\drivers\SBREdrv.sys [?]
S2 FsUsbExService;FsUsbExService;c:\windows\system32\FsUsbExService.Exe [23/04/2013 20:35 238952]
S2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes' Anti-Malware\mbamscheduler.exe [18/11/2012 19:09 418376]
S2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [03/12/2009 16:17 701512]
S2 ProtectMonitor;Protect Monitor;C:\monitorsvc.exe [13/02/2014 13:43 34244]
S2 Skype C2C Service;Skype C2C Service;c:\documents and settings\All Users\Application Data\Skype\Toolbars\Skype C2C Service\c2c_service.exe [09/10/2013 10:58 3275136]
S2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [21/06/2013 08:53 162408]
S3 ALSysIO;ALSysIO;\??\c:\docume~1\Bongo\LOCALS~1\Temp\ALSysIO.sys --> c:\docume~1\Bongo\LOCALS~1\Temp\ALSysIO.sys [?]
S3 ArcSoftKsUFilter;ArcSoft Magic-I Visual Effect;c:\windows\system32\drivers\ArcSoftKsUFilter.sys [17/12/2010 20:08 14336]
S3 ATHFMWDL;NETGEAR WG111T bootloader driver;c:\windows\system32\drivers\Athfmwdl.sys [04/08/2009 11:01 43392]
S3 DNINDIS5;DNINDIS5 NDIS Protocol Driver;c:\windows\system32\DNINDIS5.sys [04/08/2009 11:01 17149]
S3 FsUsbExDisk;FsUsbExDisk;c:\windows\system32\FsUsbExDisk.Sys [23/04/2013 20:35 36608]
S3 hitmanpro35;Hitman Pro 3.5 Support Driver;c:\windows\system32\drivers\hitmanpro35.sys [11/09/2010 04:05 23624]
S3 Lavasoft Kernexplorer;Lavasoft helper driver;\??\c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys --> c:\program files\Lavasoft\Ad-Aware\KernExplorer.sys [?]
S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [03/12/2009 16:17 22856]
S3 Pcouffin;Low level access layer for CD devices;c:\windows\system32\drivers\Pcouffin.sys [20/11/2010 18:21 47616]
S3 Revoflt;Revoflt;c:\windows\system32\drivers\revoflt.sys [06/09/2012 17:18 27064]
S3 SASENUM;SASENUM;c:\program files\SUPERAntiSpyware\SASENUM.SYS [15/09/2009 10:42 12872]
S3 ss_bbus;SAMSUNG USB Mobile Device (WDM);c:\windows\system32\drivers\ss_bbus.sys [23/04/2013 20:35 98432]
S3 ss_bmdfl;SAMSUNG USB Mobile Modem (Filter);c:\windows\system32\drivers\ss_bmdfl.sys [23/04/2013 20:35 14848]
S3 ss_bmdm;SAMSUNG USB Mobile Modem;c:\windows\system32\drivers\ss_bmdm.sys [23/04/2013 20:35 123648]
S3 ss_bserd;SAMSUNG USB Mobile Logging Driver;c:\windows\system32\drivers\ss_bserd.sys [23/04/2013 20:35 100224]
.
Contents of the 'Scheduled Tasks' folder
.
2014-03-12 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-03-23 09:30]
.
2014-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-14 14:15]
.
2014-03-06 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2009-12-14 14:15]
.
2014-03-10 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-220523388-1801674531-1004Core.job
- c:\documents and settings\Bongo\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-03-24 20:26]
.
2014-03-12 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-527237240-220523388-1801674531-1004UA.job
- c:\documents and settings\Bongo\Local Settings\Application Data\Google\Update\GoogleUpdate.exe [2013-03-24 20:26]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: {{7578ADEA-D65F-4C89-A249-B1C88B6FFC20} - c:\program files\ICQ7.5\ICQ.exe
LSP: c:\windows\system32\PCProtect.dll
TCP: DhcpNameServer = 192.168.1.254
FF - ProfilePath - c:\documents and settings\Bongo\Application Data\Mozilla\Firefox\Profiles\am443jhi.default-1375731191937\
FF - prefs.js: browser.search.selectedEngine - Google
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-03-12 20:03
Windows 5.1.2600 Service Pack 3 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ...
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_8_800_94_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\WINDOWS\\system32\\Macromed\\Flash\\FlashUtil32_11_8_800_94_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\software\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'winlogon.exe'(236)
c:\windows\system32\Ati2evxx.dll
c:\windows\system32\atiadlxx.dll
.
- - - - - - - > 'explorer.exe'(1548)
c:\windows\system32\WININET.dll
c:\program files\x264 Video Codec\Filters\Haali\mmdinfo.dll
c:\windows\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.6195_x-ww_44262b86\MSVCR80.dll
c:\windows\system32\PCProtect.dll
c:\windows\system32\hnetcfg.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\msi.dll
.
Completion time: 2014-03-12  20:06:36
ComboFix-quarantined-files.txt  2014-03-12 20:06
ComboFix2.txt  2014-03-11 22:50
.
Pre-Run: 68,016,566,272 bytes free
Post-Run: 68,066,590,720 bytes free
.
- - End Of File - - 00C567B9321B6B008ED248DA0179553D
8F558EB6672622401DA993E1E865C861
 



#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:29 AM

Posted 13 March 2014 - 07:31 AM


Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

Clean Out Temp Files
  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here CCleaner
    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. default settings are fine
    • Click Run Cleaner.
    • Close CCleaner.
: Malwarebytes' Anti-Malware :

I see that you have MBAM installed - That is great!! and at this time I would like you to update it and run me a quick scan
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.



Download HijackThis
  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic
"information and logs"
  • In your next post I need the following
    • Log From MBAM
    • report from Hijackthis
    • let me know of any problems you may have had
    • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 DrDonkeyKong

DrDonkeyKong
  • Topic Starter

  • Members
  • 10 posts
  • OFFLINE
  •  
  • Local time:05:29 AM

Posted 13 March 2014 - 03:17 PM

CCleaner worked fine

 

Malwarebytes throws up this error message

 

Runtime Error 372 - Failed to load control "Web Browser" from ieframe.dll

 

HiJackThis throws up this error:

 

Windows can not open this program because it has been prevented by software violation policy

 

Stumped now..



#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:01:29 AM

Posted 13 March 2014 - 08:05 PM



We are going to be upgrading Malwarebytes Antimalware very soon. I would like you to download the new version now and see if you have the same trouble.

To upgrade to the new version first we will have to uninstall the old version from the control panel - in (XP) add/remove and in (Vista and later) program and features

Then download the new version from here
https://www.bleepingcomputer.com/download/malwarebytes-anti-malware/_public_beta

As long as Malwarebytes Antimalware was already registered it will remember your ID and Key
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users