Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Please Help!! Havec:\Windows\System32\rpcss.dll Threat!


  • This topic is locked This topic is locked
18 replies to this topic

#1 lsmc16

lsmc16

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 06 April 2014 - 12:02 PM

Hello,

 

I really need some expert advice. Having difficulty in removing this threat---

 

Threat: virus found in win64/patched

Object name: c:\Windows\System32\rpcss.dll

 

Thank you in advance for any assistance. Have tried malware and few other items and issue is still persistent. Thanks again!!



BC AdBot (Login to Remove)

 


m

#2 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,275 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:05:00 AM

Posted 06 April 2014 - 12:27 PM

Hello! Welcome to BleepingComputer Forums! :welcome:
My name is Georgi and and I will be helping you with your computer problems.

Before we begin, please note the following:

  • I will working be on your Malware issues, this may or may not, solve other issues you have with your machine.
  • The logs can take some time to research, so please be patient with me.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • Please do not run any tools until requested ! The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.
  • Please perform all steps in the order received. If you can't understand something don't hesitate to ask.
  • Again I would like to remind you to make no further changes to your computer unless I direct you to do so. I will not help you if you do not follow my instructions.

 

 

Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

 

  • Next please re-run FRST again and type the following in the edit box after Search: rpcss.dll
  • Click the Search button
  • It will make a log (Search.txt)- please post the log into your reply to me. (you can use pastebin as well).

 

 

Regards,

Georgi


cXfZ4wS.png


#3 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 06 April 2014 - 12:51 PM

Hi Georgi, Thanks for your help!!!

 

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 13-03-2014
Ran by The Reddy Family (administrator) on THEREDDYFAMILY on 06-04-2014 12:44:19
Running from C:\Users\The Reddy Family\Desktop
Windows 7 Ultimate Service Pack 1 (X64) OS Language: English(US)
Internet Explorer Version 11
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(AVG Technologies CZ, s.r.o.) C:\Program Files (x86)\AVG\AVG2013\avgrsa.exe
(AVG Technologies CZ, s.r.o.) C:\Program Files (x86)\AVG\AVG2013\avgcsrva.exe
(Microsoft Corporation) C:\Windows\SysWOW64\svchost.exe
(Apple Inc.) C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(AVG Technologies CZ, s.r.o.) C:\Program Files (x86)\AVG\AVG2013\avgidsagent.exe
(AVG Technologies CZ, s.r.o.) C:\Program Files (x86)\AVG\AVG2013\avgwdsvc.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(Intel Corporation) C:\Windows\system32\IProsetMonitor.exe
(TeamViewer GmbH) C:\Program Files (x86)\TeamViewer\Version9\TeamViewer_Service.exe
(Google Inc.) C:\Program Files (x86)\Google\Update\1.3.23.9\GoogleCrashHandler.exe
(Google Inc.) C:\Program Files (x86)\Google\Update\1.3.23.9\GoogleCrashHandler64.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Microsoft Corporation) C:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe
(Microsoft Corporation) C:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe
(Microsoft Corporation) C:\Program Files\Windows Sidebar\sidebar.exe
(AVG Technologies CZ, s.r.o.) C:\Program Files (x86)\AVG\AVG2013\avgnsa.exe
(AVG Technologies CZ, s.r.o.) C:\Program Files (x86)\AVG\AVG2013\avgemca.exe
(Intel Corporation) C:\Windows\system32\igfxsrvc.exe
(Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
(AVG Technologies CZ, s.r.o.) C:\Program Files (x86)\AVG\AVG2013\avgui.exe
(Apple Inc.) C:\Program Files (x86)\iTunes\iTunesHelper.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Microsoft Corporation) C:\Program Files\Internet Explorer\iexplore.exe
(Adobe Systems Incorporated) C:\Windows\system32\Macromed\Flash\FlashUtil64_11_9_900_152_ActiveX.exe

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [IntelliType Pro] - C:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe [1464944 1999-12-31] (Microsoft Corporation)
HKLM\...\Run: [IntelliPoint] - C:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe [2076272 1999-12-31] (Microsoft Corporation)
HKLM-x32\...\Run: [Adobe ARM] - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [926896 2012-09-23] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [APSDaemon] - C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [43848 2014-01-20] (Apple Inc.)
HKLM-x32\...\Run: [AVG_UI] - C:\Program Files (x86)\AVG\AVG2013\avgui.exe [4411952 2014-01-21] (AVG Technologies CZ, s.r.o.)
HKLM-x32\...\Run: [QuickTime Task] - C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2013-05-01] (Apple Inc.)
HKLM-x32\...\Run: [iTunesHelper] - C:\Program Files (x86)\iTunes\iTunesHelper.exe [152392 2014-01-20] (Apple Inc.)
HKLM-x32\...\RunOnce: [Malwarebytes Anti-Malware (cleanup)] - "C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\mbamdor.exe" "C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware" [54072 2014-03-05] (Malwarebytes Corporation)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\S-1-5-21-596555025-2294599584-2425099006-1001\...\Policies\system: [LogonHoursAction] 2
HKU\S-1-5-21-596555025-2294599584-2425099006-1001\...\Policies\system: [DontDisplayLogonHoursWarnings] 1
GroupPolicyUsers\S-1-5-21-596555025-2294599584-2425099006-1003\User: Group Policy restriction detected <======= ATTENTION

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://msn.com/
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0xB7347410937ECE01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-US
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
BHO: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
BHO-x32: Adobe PDF Link Helper - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (Adobe Systems Incorporated)
BHO-x32: Google Toolbar Helper - {AA58ED58-01DD-4d91-8333-CF10577473F7} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
Toolbar: HKLM - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_64.dll (Google Inc.)
Toolbar: HKLM-x32 - Google Toolbar - {2318C2B1-4965-11d4-9B18-009027A5CD4F} - C:\Program Files (x86)\Google\Google Toolbar\GoogleToolbar_32.dll (Google Inc.)
DPF: HKLM-x32 {D27CDB6E-AE6D-11CF-96B8-444553540000} http://fpdownload2.macromedia.com/pub/shockwave/cabs/flash/swflash.cab
DPF: HKLM-x32 {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} https://secure.logmein.com//activex/ractrl.cab?lmi=1058
Handler-x32: http\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: http\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: https\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: https\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: msdaipp\0x00000001 - {E1D2BF42-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Handler-x32: msdaipp\oledb - {E1D2BF40-A96B-11d1-9C6B-0000F875AC61} - C:\Program Files (x86)\Common Files\SYSTEM\OLE DB\msdaipp.dll (Microsoft Corporation)
Filter: text/xml - {807553E5-5146-11D5-A672-00B0D022E945} -  No File
Tcpip\Parameters: [DhcpNameServer] 10.0.0.1

Chrome:
=======
CHR Extension: (Google Docs) - C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2013-11-27]
CHR Extension: (Google Drive) - C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2013-11-27]
CHR Extension: (YouTube) - C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2013-11-27]
CHR Extension: (Google Search) - C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2013-11-27]
CHR Extension: (Google Wallet) - C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2013-11-27]
CHR Extension: (Gmail) - C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2013-11-27]

==================== Services (Whitelisted) =================

R2 AVGIDSAgent; C:\Program Files (x86)\AVG\AVG2013\avgidsagent.exe [4939312 2013-07-04] (AVG Technologies CZ, s.r.o.)
R2 avgwd; C:\Program Files (x86)\AVG\AVG2013\avgwdsvc.exe [283136 2013-11-20] (AVG Technologies CZ, s.r.o.)
S2 SetupARService; C:\Program Files (x86)\Realtek\Audio\SetupAfterRebootService.exe [24576 2013-02-01] (Realtek Semiconductor.)

==================== Drivers (Whitelisted) ====================

R1 AVGIDSDriver; C:\Windows\System32\DRIVERS\avgidsdrivera.sys [246072 2013-11-25] (AVG Technologies CZ, s.r.o.)
R0 AVGIDSHA; C:\Windows\System32\DRIVERS\avgidsha.sys [71480 2013-07-20] (AVG Technologies CZ, s.r.o.)
R1 Avgldx64; C:\Windows\System32\DRIVERS\avgldx64.sys [206648 2013-07-20] (AVG Technologies CZ, s.r.o.)
R0 Avgloga; C:\Windows\System32\DRIVERS\avgloga.sys [311608 2013-07-20] (AVG Technologies CZ, s.r.o.)
R0 Avgmfx64; C:\Windows\System32\DRIVERS\avgmfx64.sys [116536 2013-07-01] (AVG Technologies CZ, s.r.o.)
R0 Avgrkx64; C:\Windows\System32\DRIVERS\avgrkx64.sys [45880 2013-10-23] (AVG Technologies CZ, s.r.o.)
R1 Avgtdia; C:\Windows\System32\DRIVERS\avgtdia.sys [240952 2014-03-20] (AVG Technologies CZ, s.r.o.)
U0 stlry; C:\Windows\System32\drivers\ojyohi.sys [79064 2014-04-06] (Malwarebytes Corporation)
S3 catchme; \??\C:\ComboFix\catchme.sys [X]
S3 IntcAzAudAddService; system32\drivers\RTKVHD64.sys [X]
S3 Synth3dVsc; System32\drivers\synth3dvsc.sys [X]
S3 tsusbhub; system32\drivers\tsusbhub.sys [X]
S3 VGPU; System32\drivers\rdvgkmd.sys [X]

==================== NetSvcs (Whitelisted) ===================

==================== One Month Created Files and Folders ========

2014-04-06 12:43 - 2014-04-06 12:44 - 02157056 _____ (Farbar) C:\Users\The Reddy Family\Desktop\FRST64.exe
2014-04-06 12:02 - 2014-04-06 12:02 - 00079064 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\ojyohi.sys
2014-04-06 11:46 - 2014-04-06 11:47 - 00000000 ____D () C:\AdwCleaner
2014-04-06 11:46 - 2014-04-06 11:46 - 01426178 _____ () C:\Users\The Reddy Family\Desktop\AdwCleaner.exe
2014-04-06 11:43 - 2014-04-06 11:43 - 00014184 _____ () C:\ComboFix.txt
2014-04-06 10:51 - 2011-06-26 01:45 - 00256000 _____ () C:\Windows\PEV.exe
2014-04-06 10:51 - 2010-11-07 12:20 - 00208896 _____ () C:\Windows\MBR.exe
2014-04-06 10:51 - 2009-04-19 23:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-04-06 10:51 - 2000-08-30 19:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-04-06 10:51 - 2000-08-30 19:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-04-06 10:51 - 2000-08-30 19:00 - 00098816 _____ () C:\Windows\sed.exe
2014-04-06 10:51 - 2000-08-30 19:00 - 00080412 _____ () C:\Windows\grep.exe
2014-04-06 10:51 - 2000-08-30 19:00 - 00068096 _____ () C:\Windows\zip.exe
2014-04-06 10:50 - 2014-04-06 11:43 - 00000000 ____D () C:\Qoobox
2014-04-06 10:50 - 2014-04-06 11:42 - 00000000 ____D () C:\Windows\erdnt
2014-04-06 10:49 - 2014-04-06 10:49 - 05195663 ____R (Swearware) C:\Users\The Reddy Family\Desktop\ComboFix.exe
2014-04-06 10:47 - 2014-04-06 10:47 - 00016254 _____ () C:\Users\The Reddy Family\Desktop\Addition.txt
2014-04-06 10:46 - 2014-04-06 12:44 - 00009785 _____ () C:\Users\The Reddy Family\Desktop\FRST.txt
2014-04-06 10:46 - 2014-04-06 12:44 - 00000000 ____D () C:\FRST
2014-04-05 23:33 - 2014-04-05 23:36 - 145678712 _____ () C:\Users\The Reddy Family\Desktop\avg_arl_ffi_all_120_140203a7055.zip
2014-04-05 15:41 - 2014-04-05 15:41 - 00021548 _____ () C:\Users\The Reddy Family\Desktop\RKreport[0]_S_04052014_154151.txt
2014-04-05 15:38 - 2014-04-05 15:38 - 00001504 _____ () C:\Users\The Reddy Family\Desktop\RKreport[0]_SC_04052014_153817.txt
2014-04-05 15:36 - 2014-04-05 15:36 - 04527616 _____ () C:\Users\The Reddy Family\Desktop\RogueKillerX64.exe
2014-04-05 15:35 - 2014-04-05 15:42 - 00000000 ____D () C:\Users\The Reddy Family\Desktop\RK_Quarantine
2014-04-05 15:21 - 2014-04-06 11:51 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-05 15:21 - 2014-04-05 15:44 - 00000000 ____D () C:\Users\The Reddy Family\Desktop\mbar
2014-04-05 15:21 - 2014-04-05 15:44 - 00000000 ____D () C:\ProgramData\Malwarebytes' Anti-Malware (portable)
2014-04-05 15:20 - 2014-04-05 15:20 - 12589848 _____ (Malwarebytes Corp.) C:\Users\The Reddy Family\Desktop\mbar-1.07.0.1009.exe
2014-04-05 14:08 - 2014-04-06 11:50 - 00001102 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-04-05 14:08 - 2014-04-06 11:50 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-04-05 14:08 - 2014-04-05 14:08 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-05 14:08 - 2014-04-03 09:51 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-05 14:08 - 2014-04-03 09:51 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-05 14:08 - 2014-04-03 09:50 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-05 14:07 - 2014-04-05 14:08 - 17523384 _____ (Malwarebytes Corporation ) C:\Users\Guest\Desktop\mb3-setup-1878.1878-3.1.2.1733-10139.exe
2014-04-04 17:29 - 2014-04-04 17:29 - 00000000 ____S () C:\Windows\system32\ptnwadx.mmp
2014-04-03 19:19 - 2014-04-03 19:19 - 00000000 ____S () C:\Windows\system32\zjhqkbl.pux
2014-04-01 23:22 - 2014-04-01 23:22 - 00000000 ____S () C:\Windows\system32\zwla.sop
2014-04-01 18:29 - 2014-04-01 18:29 - 00000000 ____S () C:\Windows\system32\vdvrm.ovy
2014-03-31 21:55 - 2014-03-31 21:55 - 00000000 ____S () C:\Windows\system32\ynmkl.wiq
2014-03-31 20:00 - 2014-03-31 20:00 - 00000000 ____S () C:\Windows\system32\nvzii.uvu
2014-03-29 22:59 - 2014-03-29 22:59 - 00000000 ____S () C:\Windows\system32\kroxb.dag
2014-03-21 12:26 - 2014-04-06 11:59 - 00000081 _____ () C:\Windows\system32\bticzou.bzk
2014-03-21 12:15 - 2014-03-21 12:15 - 00000064 _____ () C:\Windows\system32\scdk.lfm
2014-03-21 12:15 - 2014-03-21 12:15 - 00000000 _____ () C:\Windows\system32\gaja.tng
2014-03-21 11:59 - 2014-03-21 11:59 - 00377857 ____S () C:\Windows\system32\zbnbaap.ivh
2014-03-20 14:50 - 2014-03-20 14:50 - 00240952 _____ (AVG Technologies CZ, s.r.o.) C:\Windows\system32\Drivers\avgtdia.sys
2014-03-20 10:58 - 2014-03-20 10:58 - 00276608 _____ () C:\Windows\Minidump\032014-31543-01.dmp
2014-03-11 18:18 - 2014-03-01 01:05 - 23133696 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-11 18:18 - 2014-03-01 00:17 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-11 18:18 - 2014-03-01 00:16 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-03-11 18:18 - 2014-02-28 23:58 - 02765824 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-03-11 18:18 - 2014-02-28 23:52 - 00066048 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-03-11 18:18 - 2014-02-28 23:51 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-03-11 18:18 - 2014-02-28 23:42 - 00053760 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-03-11 18:18 - 2014-02-28 23:40 - 00033792 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-03-11 18:18 - 2014-02-28 23:37 - 00574976 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-03-11 18:18 - 2014-02-28 23:33 - 00139264 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-03-11 18:18 - 2014-02-28 23:33 - 00111616 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-03-11 18:18 - 2014-02-28 23:32 - 00708608 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-03-11 18:18 - 2014-02-28 23:30 - 17074688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-03-11 18:18 - 2014-02-28 23:23 - 00940032 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-03-11 18:18 - 2014-02-28 23:17 - 00218624 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-03-11 18:18 - 2014-02-28 23:11 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-03-11 18:18 - 2014-02-28 23:02 - 00195584 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-03-11 18:18 - 2014-02-28 22:54 - 05768704 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-03-11 18:18 - 2014-02-28 22:52 - 00061952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-03-11 18:18 - 2014-02-28 22:51 - 00051200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2014-03-11 18:18 - 2014-02-28 22:47 - 02168320 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-03-11 18:18 - 2014-02-28 22:43 - 00043008 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-03-11 18:18 - 2014-02-28 22:43 - 00032768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-03-11 18:18 - 2014-02-28 22:42 - 00627200 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-03-11 18:18 - 2014-02-28 22:40 - 00440832 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-03-11 18:18 - 2014-02-28 22:38 - 00112128 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-03-11 18:18 - 2014-02-28 22:37 - 00553472 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2014-03-11 18:18 - 2014-02-28 22:35 - 02041856 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-03-11 18:18 - 2014-02-28 22:18 - 13051904 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-03-11 18:18 - 2014-02-28 22:16 - 00164864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-03-11 18:18 - 2014-02-28 22:14 - 04244480 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-03-11 18:18 - 2014-02-28 22:10 - 02334208 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-03-11 18:18 - 2014-02-28 22:03 - 00524288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-03-11 18:18 - 2014-02-28 22:00 - 01964032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-03-11 18:18 - 2014-02-28 21:57 - 11266048 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-03-11 18:18 - 2014-02-28 21:38 - 01393664 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-03-11 18:18 - 2014-02-28 21:32 - 01820160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-03-11 18:18 - 2014-02-28 21:27 - 01156096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-03-11 18:18 - 2014-02-28 21:25 - 00817664 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-03-11 18:18 - 2014-02-28 21:25 - 00703488 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2014-03-11 18:18 - 2014-02-06 20:23 - 03156480 _____ (Microsoft Corporation) C:\Windows\system32\win32k.sys
2014-03-11 18:18 - 2014-02-03 21:32 - 00624128 _____ (Microsoft Corporation) C:\Windows\system32\qedit.dll
2014-03-11 18:18 - 2014-02-03 21:04 - 00509440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\qedit.dll
2014-03-11 18:18 - 2014-01-28 21:32 - 00484864 _____ (Microsoft Corporation) C:\Windows\system32\wer.dll
2014-03-11 18:18 - 2014-01-28 21:06 - 00381440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wer.dll

==================== One Month Modified Files and Folders =======

2014-04-06 12:44 - 2014-04-06 12:43 - 02157056 _____ (Farbar) C:\Users\The Reddy Family\Desktop\FRST64.exe
2014-04-06 12:44 - 2014-04-06 10:46 - 00009785 _____ () C:\Users\The Reddy Family\Desktop\FRST.txt
2014-04-06 12:44 - 2014-04-06 10:46 - 00000000 ____D () C:\FRST
2014-04-06 12:23 - 2013-10-24 19:03 - 00000918 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-04-06 12:02 - 2014-04-06 12:02 - 00079064 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\ojyohi.sys
2014-04-06 11:59 - 2014-03-21 12:26 - 00000081 _____ () C:\Windows\system32\bticzou.bzk
2014-04-06 11:57 - 2012-12-04 22:51 - 00000432 _____ () C:\Windows\Tasks\SlimDrivers Startup.job
2014-04-06 11:56 - 2009-07-13 23:45 - 00013440 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-06 11:56 - 2009-07-13 23:45 - 00013440 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-06 11:55 - 2009-07-14 00:13 - 00726444 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-06 11:53 - 2012-11-27 15:39 - 01917365 _____ () C:\Windows\WindowsUpdate.log
2014-04-06 11:51 - 2014-04-05 15:21 - 00119512 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-06 11:50 - 2014-04-05 14:08 - 00001102 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-04-06 11:50 - 2014-04-05 14:08 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-04-06 11:50 - 2012-12-04 22:51 - 00002880 _____ () C:\Windows\System32\Tasks\SlimDrivers Startup
2014-04-06 11:49 - 2013-10-24 19:03 - 00000914 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-04-06 11:49 - 2012-12-06 05:46 - 00023384 _____ () C:\Windows\PFRO.log
2014-04-06 11:49 - 2009-07-14 00:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-06 11:49 - 2009-07-13 23:51 - 00065646 _____ () C:\Windows\setupact.log
2014-04-06 11:47 - 2014-04-06 11:46 - 00000000 ____D () C:\AdwCleaner
2014-04-06 11:46 - 2014-04-06 11:46 - 01426178 _____ () C:\Users\The Reddy Family\Desktop\AdwCleaner.exe
2014-04-06 11:43 - 2014-04-06 11:43 - 00014184 _____ () C:\ComboFix.txt
2014-04-06 11:43 - 2014-04-06 10:50 - 00000000 ____D () C:\Qoobox
2014-04-06 11:43 - 2009-07-13 22:20 - 00000000 __RHD () C:\Users\Default
2014-04-06 11:42 - 2014-04-06 10:50 - 00000000 ____D () C:\Windows\erdnt
2014-04-06 11:41 - 2009-07-13 21:34 - 00000215 _____ () C:\Windows\system.ini
2014-04-06 10:49 - 2014-04-06 10:49 - 05195663 ____R (Swearware) C:\Users\The Reddy Family\Desktop\ComboFix.exe
2014-04-06 10:47 - 2014-04-06 10:47 - 00016254 _____ () C:\Users\The Reddy Family\Desktop\Addition.txt
2014-04-06 08:25 - 2013-02-26 22:02 - 00000000 ____D () C:\ProgramData\MFAData
2014-04-05 23:36 - 2014-04-05 23:33 - 145678712 _____ () C:\Users\The Reddy Family\Desktop\avg_arl_ffi_all_120_140203a7055.zip
2014-04-05 16:28 - 2014-02-03 20:42 - 00001090 _____ () C:\Users\Public\Desktop\TeamViewer 9.lnk
2014-04-05 15:44 - 2014-04-05 15:21 - 00000000 ____D () C:\Users\The Reddy Family\Desktop\mbar
2014-04-05 15:44 - 2014-04-05 15:21 - 00000000 ____D () C:\ProgramData\Malwarebytes' Anti-Malware (portable)
2014-04-05 15:42 - 2014-04-05 15:35 - 00000000 ____D () C:\Users\The Reddy Family\Desktop\RK_Quarantine
2014-04-05 15:42 - 2012-11-27 13:46 - 00000000 ___RD () C:\Users\The Reddy Family\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
2014-04-05 15:41 - 2014-04-05 15:41 - 00021548 _____ () C:\Users\The Reddy Family\Desktop\RKreport[0]_S_04052014_154151.txt
2014-04-05 15:38 - 2014-04-05 15:38 - 00001504 _____ () C:\Users\The Reddy Family\Desktop\RKreport[0]_SC_04052014_153817.txt
2014-04-05 15:36 - 2014-04-05 15:36 - 04527616 _____ () C:\Users\The Reddy Family\Desktop\RogueKillerX64.exe
2014-04-05 15:20 - 2014-04-05 15:20 - 12589848 _____ (Malwarebytes Corp.) C:\Users\The Reddy Family\Desktop\mbar-1.07.0.1009.exe
2014-04-05 14:08 - 2014-04-05 14:08 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-05 14:08 - 2014-04-05 14:07 - 17523384 _____ (Malwarebytes Corporation ) C:\Users\Guest\Desktop\mb3-setup-1878.1878-3.1.2.1733-10139.exe
2014-04-04 17:29 - 2014-04-04 17:29 - 00000000 ____S () C:\Windows\system32\ptnwadx.mmp
2014-04-03 19:19 - 2014-04-03 19:19 - 00000000 ____S () C:\Windows\system32\zjhqkbl.pux
2014-04-03 09:51 - 2014-04-05 14:08 - 00088280 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-03 09:51 - 2014-04-05 14:08 - 00063192 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-03 09:50 - 2014-04-05 14:08 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-01 23:22 - 2014-04-01 23:22 - 00000000 ____S () C:\Windows\system32\zwla.sop
2014-04-01 18:29 - 2014-04-01 18:29 - 00000000 ____S () C:\Windows\system32\vdvrm.ovy
2014-03-31 21:55 - 2014-03-31 21:55 - 00000000 ____S () C:\Windows\system32\ynmkl.wiq
2014-03-31 20:00 - 2014-03-31 20:00 - 00000000 ____S () C:\Windows\system32\nvzii.uvu
2014-03-29 22:59 - 2014-03-29 22:59 - 00000000 ____S () C:\Windows\system32\kroxb.dag
2014-03-28 17:18 - 2013-10-24 19:03 - 00003914 _____ () C:\Windows\System32\Tasks\GoogleUpdateTaskMachineUA
2014-03-28 17:18 - 2013-10-24 19:03 - 00003662 _____ () C:\Windows\System32\Tasks\GoogleUpdateTaskMachineCore
2014-03-27 18:09 - 2013-02-26 22:08 - 00000965 _____ () C:\Users\Public\Desktop\AVG 2013.lnk
2014-03-21 12:15 - 2014-03-21 12:15 - 00000064 _____ () C:\Windows\system32\scdk.lfm
2014-03-21 12:15 - 2014-03-21 12:15 - 00000000 _____ () C:\Windows\system32\gaja.tng
2014-03-21 11:59 - 2014-03-21 11:59 - 00377857 ____S () C:\Windows\system32\zbnbaap.ivh
2014-03-20 14:50 - 2014-03-20 14:50 - 00240952 _____ (AVG Technologies CZ, s.r.o.) C:\Windows\system32\Drivers\avgtdia.sys
2014-03-20 11:35 - 2013-11-27 18:01 - 00002183 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2014-03-20 10:58 - 2014-03-20 10:58 - 00276608 _____ () C:\Windows\Minidump\032014-31543-01.dmp
2014-03-20 10:58 - 2013-10-29 14:03 - 00000000 ____D () C:\Windows\Minidump
2014-03-20 10:57 - 2013-10-29 14:03 - 190849570 _____ () C:\Windows\MEMORY.DMP
2014-03-13 13:46 - 2014-02-27 20:59 - 00000000 ____D () C:\Users\Guest\AppData\Roaming\TeamViewer
2014-03-12 03:19 - 2009-07-13 23:45 - 00365552 _____ () C:\Windows\system32\FNTCACHE.DAT

Some content of TEMP:
====================
C:\Users\The Reddy Family\AppData\Local\Temp\Quarantine.exe

==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\rpcss.dll
[2012-11-29 08:03] - [2010-11-20 08:27] - 0513536 ____A (Microsoft Corporation) 94A870C939D739F0C29443962558CFC0

 ATTENTION ======> If the system is having audio adware rpcss.dll is patched. Google the MD5, if the MD5 is unique the file is infected.
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

LastRegBack: 2014-03-30 10:03

==================== End Of Log ============================



#4 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 06 April 2014 - 12:58 PM

Farbar Recovery Scan Tool (x64) Version: 13-03-2014
Ran by The Reddy Family at 2014-04-06 12:51:53
Running from C:\Users\The Reddy Family\Desktop
Boot Mode: Normal

================== Search: "rpcss.dll" ===================

C:\Windows.old\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6001.18000_none_69cadbfc3ddffe3c\rpcss.dll
[2008-01-20 21:24] - [2008-01-20 21:24] - 0547328 ____A (Microsoft Corporation) 33FB1F0193EE2051067441492D56113C

C:\Windows.old\Windows\System32\rpcss.dll
[2008-01-20 21:24] - [2008-01-20 21:24] - 0547328 ____A (Microsoft Corporation) 33FB1F0193EE2051067441492D56113C

C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_c7f0e16b547f887d\rpcss.dll
[2012-11-29 08:03] - [2010-11-20 08:27] - 0512000 ____A (Microsoft Corporation) 5C627D1B1138676C0A7AB2C2C190D123

C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7600.16385_none_c5bfcda3579104e3\rpcss.dll
[2009-07-13 19:00] - [2009-07-13 20:41] - 0509440 ____A (Microsoft Corporation) 7266972E86890E2B30C0C322E906B027

C:\Windows\System32\rpcss.dll
[2012-11-29 08:03] - [2010-11-20 08:27] - 0513536 ____A (Microsoft Corporation) 94A870C939D739F0C29443962558CFC0

====== End Of Search ======



#5 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,275 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:05:00 AM

Posted 06 April 2014 - 01:03 PM

Hello,

 

 

Please post the Addition.txt log as well! :)

 

 

Regards,

Georgi


cXfZ4wS.png


#6 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 06 April 2014 - 01:04 PM

Sorry Georgi!!

 

Additional scan result of Farbar Recovery Scan Tool (x64) Version: 13-03-2014
Ran by The Reddy Family at 2014-04-06 10:47:02
Running from C:\Users\The Reddy Family\Desktop
Boot Mode: Normal
==========================================================

==================== Security Center ========================

AV: AVG AntiVirus Free Edition 2013 (Enabled - Up to date) {0E9420C4-06B3-7FA0-3AB1-6E49CB52ECD9}
AS: Windows Defender (Disabled - Up to date) {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
AS: AVG AntiVirus Free Edition 2013 (Enabled - Up to date) {B5F5C120-2089-702E-0001-553BB0D5A664}

==================== Installed Programs ======================

Adobe Flash Player 11 ActiveX (HKLM-x32\...\Adobe Flash Player ActiveX) (Version: 11.9.900.152 - Adobe Systems Incorporated)
Adobe Reader XI (HKLM-x32\...\{AC76BA86-7AD7-1033-7B44-AB0000000001}) (Version: 11.0.00 - Adobe Systems Incorporated)
Apple Application Support (HKLM-x32\...\{46F044A5-CE8B-4196-984E-5BD6525E361D}) (Version: 2.3.6 - Apple Inc.)
Apple Application Support (HKLM-x32\...\{A922C4B7-50E0-4787-A94C-59DBF3C65DBE}) (Version: 3.0 - Apple Inc.)
Apple Mobile Device Support (HKLM\...\{FE86CB0C-FCB3-4358-B4B0-B0A41E33B3DD}) (Version: 7.1.0.32 - Apple Inc.)
Apple Software Update (HKLM-x32\...\{789A5B64-9DD9-4BA5-915A-F0FC0A1B7BFE}) (Version: 2.1.3.127 - Apple Inc.)
AVG 2013 (HKLM\...\AVG) (Version: 2013.0.3465 - AVG Technologies)
AVG 2013 (Version: 13.0.3465 - AVG Technologies) Hidden
AVG 2013 (Version: 13.0.3722 - AVG Technologies) Hidden
Bonjour (HKLM\...\{6E3610B2-430D-4EB0-81E3-2B57E8B9DE8D}) (Version: 3.0.0.10 - Apple Inc.)
Citrix online plug-in (DV) (x32 Version: 12.0.0.6410 - Citrix Systems, Inc.) Hidden
Citrix online plug-in (HDX) (x32 Version: 12.0.0.6410 - Citrix Systems, Inc.) Hidden
Citrix online plug-in (Web) (x32 Version: 12.0.0.6410 - Citrix Systems, Inc.) Hidden
Compatibility Pack for the 2007 Office system (HKLM-x32\...\{90120000-0020-0409-0000-0000000FF1CE}) (Version: 12.0.6514.5001 - Microsoft Corporation)
Convert XLSX to XLS (HKLM-x32\...\{3B65F1C6-9969-4FF5-9FCD-E0EC2A3F4DAD}) (Version: 1.0.0 - Excel-Tool)
DesktopWeatherAlerts (HKCU\...\DesktopWeatherAlerts) (Version: 1.0.13.0 - Local Weather LLC)
Freemake Video Converter version 4.1.3 (HKLM-x32\...\Freemake Video Converter_is1) (Version: 4.1.3 - Ellora Assets Corporation)
Google Chrome (HKLM-x32\...\Google Chrome) (Version: 33.0.1750.154 - Google Inc.)
Google Earth (HKLM-x32\...\{4D2A6330-2F8B-11E3-9C40-B8AC6F97B88E}) (Version: 7.1.2.2041 - Google)
Google Toolbar for Internet Explorer (HKLM-x32\...\{2318C2B1-4965-11d4-9B18-009027A5CD4F}) (Version: 7.5.5111.1712 - Google Inc.)
Google Toolbar for Internet Explorer (x32 Version: 1.0.0 - Google Inc.) Hidden
Google Update Helper (x32 Version: 1.3.23.9 - Google Inc.) Hidden
HandBrake 0.9.9.1 (HKLM-x32\...\HandBrake) (Version: 0.9.9.1 - )
Intel® Graphics Media Accelerator Driver (HKLM\...\HDMI) (Version: 8.15.10.1930 - Intel Corporation)
Intel® Network Connections 17.4.95.0 (HKLM\...\PROSetDX) (Version: 17.4.95.0 - Intel)
Intel® Network Connections 17.4.95.0 (Version: 17.4.95.0 - Intel) Hidden
iStonsoft iPad Video Converter build(2.1.2) (HKLM-x32\...\iStonsoft iPad Video Converter_is1) (Version: 2.1.2 - iStonsoft)
iTunes (HKLM\...\{0D924CB2-2EA4-4044-BAF7-770202D6BD0D}) (Version: 11.1.4.62 - Apple Inc.)
Malwarebytes Anti-Malware version 2.00.0.1000 (HKLM-x32\...\Malwarebytes Anti-Malware_is1) (Version: 2.00.0.1000 - Malwarebytes Corporation)
Microlife AA 3.2.5 (HKLM-x32\...\InstallShield_{B7114AC6-C4D5-4D14-93C6-A74F0066CDC1}) (Version: 3.2.5 - Microlife)
Microlife AA 3.2.5 (x32 Version: 3.2.5 - Microlife) Hidden
Microsoft .NET Framework 4 Client Profile (HKLM\...\Microsoft .NET Framework 4 Client Profile) (Version: 4.0.30319 - Microsoft Corporation)
Microsoft .NET Framework 4 Client Profile (Version: 4.0.30319 - Microsoft Corporation) Hidden
Microsoft Mouse and Keyboard Center (HKLM\...\Microsoft Mouse and Keyboard Center) (Version: 2.0.162.0 - Microsoft Corporation)
Microsoft Mouse and Keyboard Center (Version: 2.0.162.0 - Microsoft Corporation) Hidden
Microsoft Office Excel Viewer (HKLM-x32\...\{95120000-003F-0409-0000-0000000FF1CE}) (Version: 12.0.6219.1000 - Microsoft Corporation)
Microsoft Office Professional Edition 2003 (HKLM-x32\...\{90110409-6000-11D3-8CFE-0150048383C9}) (Version: 11.0.6353.0 - Microsoft Corporation)
Microsoft Silverlight (HKLM\...\{89F4137D-6C26-4A84-BDB8-2E5A4BB71E00}) (Version: 5.1.20513.0 - Microsoft Corporation)
Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17 (HKLM\...\{8220EEFE-38CD-377E-8595-13398D740ACE}) (Version: 9.0.30729 - Microsoft Corporation)
Microsoft Visual C++ 2010  x86 Redistributable - 10.0.40219 (HKLM-x32\...\{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}) (Version: 10.0.40219 - Microsoft Corporation)
QuickTime (HKLM-x32\...\{B67BAFBA-4C9F-48FA-9496-933E3B255044}) (Version: 7.74.80.86 - Apple Inc.)
SlimDrivers (HKLM-x32\...\{3A86CB72-8BA6-4CA3-A864-E34AA4A69554}) (Version: 2.2.27042 - SlimWare Utilities, Inc.)
TeamViewer 9 (HKLM-x32\...\TeamViewer 9) (Version: 9.0.27614 - TeamViewer)
The Imagination Station (remove only) (HKLM-x32\...\The Imagination Station) (Version:  - )
Visual Studio 2010 x64 Redistributables (HKLM\...\{21B133D6-5979-47F0-BE1C-F6A6B304693F}) (Version: 13.0.0.1 - AVG Technologies)
VLC media player 2.0.5 (HKLM-x32\...\VLC media player) (Version: 2.0.5 - VideoLAN)

==================== Restore Points  =========================

06-09-2013 05:00:02 Scheduled Checkpoint
11-09-2013 08:00:23 Windows Update
18-09-2013 20:41:40 Scheduled Checkpoint
26-09-2013 05:16:52 Scheduled Checkpoint
03-10-2013 22:04:36 Scheduled Checkpoint
13-10-2013 03:44:35 Scheduled Checkpoint
13-10-2013 08:00:23 Windows Update
21-10-2013 12:07:26 Scheduled Checkpoint
28-10-2013 22:49:13 Scheduled Checkpoint
06-11-2013 19:39:32 Scheduled Checkpoint
09-11-2013 01:26:19 Installed Compatibility Pack for the 2007 Office system
09-11-2013 01:28:20 Installed Microsoft Office Excel Viewer
13-11-2013 09:00:24 Windows Update
22-11-2013 01:47:06 Scheduled Checkpoint
26-11-2013 09:00:22 Windows Update
04-12-2013 14:16:28 Scheduled Checkpoint
05-12-2013 01:15:24 Installed Microlife AA 3.2.5
11-12-2013 09:00:50 Windows Update
18-12-2013 13:26:34 Scheduled Checkpoint
25-12-2013 23:19:49 Scheduled Checkpoint
03-01-2014 04:06:19 Scheduled Checkpoint
11-01-2014 03:05:42 Scheduled Checkpoint
15-01-2014 09:00:24 Windows Update
23-01-2014 13:49:56 Scheduled Checkpoint
31-01-2014 22:14:13 Scheduled Checkpoint
01-02-2014 02:02:28 Installed QuickTime
01-02-2014 02:28:03 Installed QuickTime
01-02-2014 02:45:08 Installed iTunes
08-02-2014 15:55:39 Scheduled Checkpoint
14-02-2014 09:00:24 Windows Update
21-02-2014 16:14:07 Scheduled Checkpoint
01-03-2014 21:16:30 Scheduled Checkpoint
09-03-2014 17:40:17 Scheduled Checkpoint
12-03-2014 08:00:24 Windows Update
20-03-2014 20:06:46 Scheduled Checkpoint
29-03-2014 21:32:25 Scheduled Checkpoint
05-04-2014 21:59:19 Scheduled Checkpoint

==================== Hosts content: ==========================

2009-07-13 21:34 - 2009-06-10 16:00 - 00000824 ____A C:\Windows\system32\Drivers\etc\hosts

==================== Scheduled Tasks (whitelisted) =============

Task: {3693F8B8-5B0C-4757-8519-AC373BCCF3BA} - System32\Tasks\SlimDrivers Startup => C:\Program Files (x86)\SlimDrivers\SlimDrivers.exe [2013-01-31] (SlimWare Utilities, Inc.)
Task: {5868F0EA-8891-4FBC-B62E-22AE48D0AAD7} - System32\Tasks\GoogleUpdateTaskMachineCore => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2013-10-24] (Google Inc.)
Task: {DD9DD942-EB8C-4013-B4A2-ABF232DFFB71} - System32\Tasks\GoogleUpdateTaskMachineUA => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe [2013-10-24] (Google Inc.)
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job => C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Task: C:\Windows\Tasks\SlimDrivers Startup.job => C:\Program Files (x86)\SlimDrivers\SlimDrivers.exe

==================== Loaded Modules (whitelisted) =============

2014-01-20 14:17 - 2014-01-20 14:17 - 00073544 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\zlib1.dll
2014-01-20 14:16 - 2014-01-20 14:16 - 01044808 _____ () C:\Program Files (x86)\Common Files\Apple\Apple Application Support\libxml2.dll

==================== Alternate Data Streams (whitelisted) =========

==================== Safe Mode (whitelisted) ===================

==================== Disabled items from MSCONFIG ==============

==================== Faulty Device Manager Devices =============

Name: NETGEAR WNDR3400v2 N600 Wireless Router
Description: NETGEAR WNDR3400v2 N600 Wireless Router
Class Guid:
Manufacturer:
Service:
Problem: : The drivers for this device are not installed. (Code 28)
Resolution: To install the drivers for this device, click "Update Driver", which starts the Hardware Update wizard.

==================== Event log errors: =========================

Application errors:
==================
Error: (04/05/2014 11:43:00 PM) (Source: Application Hang) (User: )
Description: The program IEXPLORE.EXE version 11.0.9600.16521 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: 1370

Start Time: 01cf51529eaec177

Termination Time: 5

Application Path: C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Report Id:

Error: (04/05/2014 03:08:48 PM) (Source: SetupARService) (User: )
Description: Service cannot be started. System.NullReferenceException: Object reference not set to an instance of an object.
   at SetupAfterRebootService.SetupARService.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (04/05/2014 10:50:36 AM) (Source: Application Hang) (User: )
Description: The program IEXPLORE.EXE version 11.0.9600.16521 stopped interacting with Windows and was closed. To see if more information about the problem is available, check the problem history in the Action Center control panel.

Process ID: 1f78

Start Time: 01cf4f83aa61c6e2

Termination Time: 0

Application Path: C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Report Id:

Error: (04/04/2014 02:46:10 AM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 7504

Error: (04/04/2014 02:46:10 AM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 7504

Error: (04/04/2014 02:46:10 AM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (04/04/2014 02:46:08 AM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 4992

Error: (04/04/2014 02:46:08 AM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledEvent 4992

Error: (04/04/2014 02:46:08 AM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (04/04/2014 02:46:05 AM) (Source: Bonjour Service) (User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 2496

System errors:
=============
Error: (04/06/2014 01:04:58 AM) (Source: DCOM) (User: TheReddyFamily)
Description: application-specificLocalActivation{8BC3F05E-D86B-11D0-A075-00C04FB68820}{8BC3F05E-D86B-11D0-A075-00C04FB68820}TheReddyFamilyGuestS-1-5-21-596555025-2294599584-2425099006-501LocalHost (Using LRPC)

Error: (04/06/2014 01:04:57 AM) (Source: DCOM) (User: TheReddyFamily)
Description: application-specificLocalActivation{8BC3F05E-D86B-11D0-A075-00C04FB68820}{8BC3F05E-D86B-11D0-A075-00C04FB68820}TheReddyFamilyGuestS-1-5-21-596555025-2294599584-2425099006-501LocalHost (Using LRPC)

Error: (04/05/2014 07:37:48 PM) (Source: Disk) (User: )
Description: The driver detected a controller error on \Device\Harddisk2\DR2.

Error: (04/05/2014 07:37:47 PM) (Source: Disk) (User: )
Description: The driver detected a controller error on \Device\Harddisk2\DR2.

Error: (04/05/2014 07:37:47 PM) (Source: Disk) (User: )
Description: The driver detected a controller error on \Device\Harddisk2\DR2.

Error: (04/05/2014 07:37:46 PM) (Source: Disk) (User: )
Description: The driver detected a controller error on \Device\Harddisk2\DR2.

Error: (04/05/2014 07:37:46 PM) (Source: Disk) (User: )
Description: The driver detected a controller error on \Device\Harddisk2\DR2.

Error: (04/05/2014 03:13:06 PM) (Source: DCOM) (User: TheReddyFamily)
Description: application-specificLocalActivation{8BC3F05E-D86B-11D0-A075-00C04FB68820}{8BC3F05E-D86B-11D0-A075-00C04FB68820}TheReddyFamilyGuestS-1-5-21-596555025-2294599584-2425099006-501LocalHost (Using LRPC)

Error: (04/05/2014 03:08:49 PM) (Source: Service Control Manager) (User: )
Description: The ScRegSetValueExW call failed for FailureActions with the following error:
%%5

Error: (04/05/2014 03:07:19 PM) (Source: Service Control Manager) (User: )
Description: The ScRegSetValueExW call failed for FailureActions with the following error:
%%5

Microsoft Office Sessions:
=========================
Error: (04/05/2014 11:43:00 PM) (Source: Application Hang)(User: )
Description: IEXPLORE.EXE11.0.9600.16521137001cf51529eaec1775C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Error: (04/05/2014 03:08:48 PM) (Source: SetupARService)(User: )
Description: Service cannot be started. System.NullReferenceException: Object reference not set to an instance of an object.
   at SetupAfterRebootService.SetupARService.OnStart(String[] args)
   at System.ServiceProcess.ServiceBase.ServiceQueuedMainCallback(Object state)

Error: (04/05/2014 10:50:36 AM) (Source: Application Hang)(User: )
Description: IEXPLORE.EXE11.0.9600.165211f7801cf4f83aa61c6e20C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE

Error: (04/04/2014 02:46:10 AM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 7504

Error: (04/04/2014 02:46:10 AM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledEvent 7504

Error: (04/04/2014 02:46:10 AM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (04/04/2014 02:46:08 AM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 4992

Error: (04/04/2014 02:46:08 AM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledEvent 4992

Error: (04/04/2014 02:46:08 AM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: Continuously busy for more than a second

Error: (04/04/2014 02:46:05 AM) (Source: Bonjour Service)(User: )
Description: Task Scheduling Error: m->NextScheduledSPRetry 2496

==================== Memory info ===========================

Percentage of memory in use: 44%
Total physical RAM: 3061.18 MB
Available physical RAM: 1689.56 MB
Total Pagefile: 6120.53 MB
Available Pagefile: 3895.83 MB
Total Virtual: 8192 MB
Available Virtual: 8191.82 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:559.75 GB) (Free:37.67 GB) NTFS ==>[Drive with boot components (obtained from BCD)]
Drive g: (Back Up Drive) (Fixed) (Total:931.51 GB) (Free:580.86 GB) NTFS
Drive h: (New Volume) (Fixed) (Total:371.76 GB) (Free:371.65 GB) NTFS

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (MBR Code: Windows 7 or 8) (Size: 932 GB) (Disk ID: E62596C8)

Partition: GPT Partition Type.

========================================================
Disk: 1 (MBR Code: Windows XP) (Size: 932 GB) (Disk ID: 07FAC3A3)
Partition 1: (Not Active) - (Size=932 GB) - (Type=07 NTFS)

==================== End Of Log ============================



#7 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,275 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:05:00 AM

Posted 06 April 2014 - 03:09 PM

Hi,
 
 
Please download the following file => [attachment=148987:fixlist.txt] and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.
 
 
Regards,
Georgi
 


cXfZ4wS.png


#8 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 07 April 2014 - 07:41 AM

Hi Georgi!!

 

Looks like it worked as it is no longer giving me the virus warning. Two questions---1) I am using AVG free for virus protection and run malwarebytes every few weeks---any recs on other anti-virus or malware programs I should be using? 2) Any idea how I got this??

 

THANK YOU so much for your help!!! I can't say enough about this website and people like you helping out!! Thanks again!

 

 

 

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 13-03-2014
Ran by The Reddy Family at 2014-04-07 07:34:09 Run:1
Running from C:\Users\The Reddy Family\Desktop
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
start
GroupPolicyUsers\S-1-5-21-596555025-2294599584-2425099006-1003\User: Group Policy restriction detected <======= ATTENTION
S3 catchme; \??\C:\ComboFix\catchme.sys [X]
2014-04-04 17:29 - 2014-04-04 17:29 - 00000000 ____S () C:\Windows\system32\ptnwadx.mmp
2014-04-03 19:19 - 2014-04-03 19:19 - 00000000 ____S () C:\Windows\system32\zjhqkbl.pux
2014-04-01 23:22 - 2014-04-01 23:22 - 00000000 ____S () C:\Windows\system32\zwla.sop
2014-04-01 18:29 - 2014-04-01 18:29 - 00000000 ____S () C:\Windows\system32\vdvrm.ovy
2014-03-31 21:55 - 2014-03-31 21:55 - 00000000 ____S () C:\Windows\system32\ynmkl.wiq
2014-03-31 20:00 - 2014-03-31 20:00 - 00000000 ____S () C:\Windows\system32\nvzii.uvu
2014-03-29 22:59 - 2014-03-29 22:59 - 00000000 ____S () C:\Windows\system32\kroxb.dag
2014-03-21 12:26 - 2014-04-06 11:59 - 00000081 _____ () C:\Windows\system32\bticzou.bzk
2014-03-21 12:15 - 2014-03-21 12:15 - 00000064 _____ () C:\Windows\system32\scdk.lfm
2014-03-21 12:15 - 2014-03-21 12:15 - 00000000 _____ () C:\Windows\system32\gaja.tng
2014-03-21 11:59 - 2014-03-21 11:59 - 00377857 ____S () C:\Windows\system32\zbnbaap.ivh
Replace: C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_c7f0e16b547f887d\rpcss.dll C:\Windows\System32\rpcss.dll
C:\Users\The Reddy Family\AppData\Local\Temp
end
*****************

C:\Windows\system32\GroupPolicyUsers\S-1-5-21-596555025-2294599584-2425099006-1003\User => Moved successfully.
C:\Windows\system32\GroupPolicy\GPT.ini => Moved successfully.
catchme => Service deleted successfully.
C:\Windows\system32\ptnwadx.mmp => Moved successfully.
C:\Windows\system32\zjhqkbl.pux => Moved successfully.
C:\Windows\system32\zwla.sop => Moved successfully.
C:\Windows\system32\vdvrm.ovy => Moved successfully.
C:\Windows\system32\ynmkl.wiq => Moved successfully.
C:\Windows\system32\nvzii.uvu => Moved successfully.
C:\Windows\system32\kroxb.dag => Moved successfully.
C:\Windows\system32\bticzou.bzk => Moved successfully.
C:\Windows\system32\scdk.lfm => Moved successfully.
Could not move "C:\Windows\system32\gaja.tng" => Scheduled to move on reboot.
Could not move "C:\Windows\system32\zbnbaap.ivh" => Scheduled to move on reboot.
C:\Windows\System32\rpcss.dll => Moved successfully.
C:\Windows\winsxs\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_c7f0e16b547f887d\rpcss.dll copied successfully to C:\Windows\System32\rpcss.dll

"C:\Users\The Reddy Family\AppData\Local\Temp" directory move:

Could not move "C:\Users\The Reddy Family\AppData\Local\Temp\AdobeARM.log" => Scheduled to move on reboot.
C:\Users\The Reddy Family\AppData\Local\Temp\AdwCleaner.jpg => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\ArmUI.ini => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Cleaning.ico => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Donate.ico => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\EULA.txt => Moved successfully.
Could not move "C:\Users\The Reddy Family\AppData\Local\Temp\FXSAPIDebugLogFile.txt" => Scheduled to move on reboot.
C:\Users\The Reddy Family\AppData\Local\Temp\preferences => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Quarantine.exe => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Report.ico => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Scan.ico => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\StructuredQuery.log => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Uninstall.ico => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DF13BC490AA42EB55B.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DF191B4A47F9A25B37.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DF3E47312FA3451BFE.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DF524183E8B670F093.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DF5BFB0C4969679407.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DF7EB9EF615B188AC1.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DF84098D7EF3DA8BE6.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DFB0193876FAC4A11B.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DFB7D73DCD8F81211A.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\~DFDC8EF71EE070BDCD.TMP => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Low\datBBC2.tmp => Moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\Low\datBC7E.tmp => Moved successfully.
Could not move "C:\Users\The Reddy Family\AppData\Local\Temp" directory. => Scheduled to move on reboot.

=> Result of Scheduled Files to move (Boot Mode: Normal) (Date&Time: 2014-04-07 07:36:29)<=

C:\Windows\system32\gaja.tng => Is moved successfully.
C:\Windows\system32\zbnbaap.ivh => Is moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\AdobeARM.log => Is moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp\FXSAPIDebugLogFile.txt => Is moved successfully.
C:\Users\The Reddy Family\AppData\Local\Temp => Moved successfully.

==== End of Fixlog ====



#9 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,275 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:05:00 AM

Posted 07 April 2014 - 02:09 PM

Looks like it worked as it is no longer giving me the virus warning.

 

I am glad to hear that! :)

 

 

Two questions---1) I am using AVG free for virus protection and run malwarebytes every few weeks---any recs on other anti-virus or malware programs I should be using?

 

I'll give you my final recommendations at the end of the cleaning process. :)

 

 

2) Any idea how I got this??

 

You can read the following articles for more information:

 

https://blog.avast.com/2014/01/15/win3264blackbeard-pigeon-stealthiness-techniques-in-64-bit-windows-part-1/

https://blog.avast.com/2014/01/22/win3264blackbeard-pigeon-stealthiness-techniques-in-64-bit-windows-part-2/

 

THANK YOU so much for your help!!! I can't say enough about this website and people like you helping out!! Thanks again!

 

My pleasure. :)

 

Although we managed to clean the infection I want to make sure there is nothing lurking on the system so just in case I want you to go through these steps:

 

The most of them should take no more than 5 minutes each (but the time they take to complete can vary depending on the size of your hard and the speed of your computer).

 

 

STEP 1

 

 

  • Please download RKill by Grinler from the link below and save it to your desktop.

    Rkill
  • Before we begin, you should disable your anti-malware softwares you have installed so they do not interfere RKill running as some anti-malware softwares detect RKill as malicious. Please refer to this page if you are not sure how.
  • Double-click on Rkill on your desktop to run it. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • If nothing happens or if the tool does not run, please let me know in your next reply.
  • A log pops up at the end of the run. This log file is located at C:\rkill.log.
  • Please post the log in your next reply.

 

 

STEP 2

 

 

  • Please download RogueKillerX64.exe and save to the desktop.
  • Close all windows and browsers
  • Right-click the program and select 'Run as Administrator'
  • Press the scan button.
  • A report opens on the desktop named - RKreport.txt
  • Please copy and past the results at pastebin.com and post the link to the log in your next reply.

 

 

STEP 3
 

 

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
     
  • Put a checkmark beside loaded modules.
    Sbf88.png
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
     
  • Click the Start Scan button.
     
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
    67776163.jpg
  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.
    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    62117367.jpg
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and past the results at pastebin.com and post the link to the log in your next reply.

 

 

STEP 4

 

 

Please download Malwarebytes Anti-Malware to your desktop.
 

  • Double-click mb3-setup-1878.1878-3.1.2.1733-10139.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish.
  • On the Settings tab > Detection and Protection subtab, Detection Options, tick the box 'Scan for rootkits'.
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • With some infections, you may see this message box.
    • 'Could not load DDA driver'
  • Click 'Yes' to this message, to allow the driver to load after a restart.
  • Allow the computer to restart. Continue with the rest of these instructions.
  • When the scan is complete, click Apply Actions.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

 

 

STEP 5

 

 

1.Please download HitmanPro.

  • For 32-bit Operating System - dEMD6.gif.
  • This is the mirror - dEMD6.gif
  • For 64-bit Operating System - dEMD6.gif
  • This is the mirror - dEMD6.gif

2.Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).

Note: If the program won't run please then open the program while holding down the left CTRL key until the program is loaded.

3.Click on the next button. You must agree with the terms of EULA. (if asked)

4.Check the box beside "No, I only want to perform a one-time scan to check this computer".

5.Click on the next button.

6.The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.

7.When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!
 
8.Click on the next button.

9.Click on the "Save Log" button.

10.Save that file to your desktop and post the content of that file in your next reply.
 
Note: if there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro

Navigate to C:\ProgramData\HitmanPro\Logs open the report and copy and paste it to your next reply.

 

 

 

STEP 6

 

 

Download Security Check by screen317 from here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

 

and then if there aren't any issues left I'll give you my final recommendations. :)

 

 

Regards,

Georgi


cXfZ4wS.png


#10 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 10 April 2014 - 07:56 AM

Hi Georgi---here is step 1

 

Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 04/10/2014 07:50:18 AM in x64 mode.
Windows Version: Windows 7 Ultimate Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * Windows Defender Disabled

   [HKLM\SOFTWARE\Microsoft\Windows Defender]
   "DisableAntiSpyware" = dword:00000001

Checking Windows Service Integrity:

 * Windows Defender (WinDefend) is not Running.
   Startup Type set to: Manual

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1       localhost

Program finished at: 04/10/2014 07:55:10 AM
Execution time: 0 hours(s), 4 minute(s), and 51 seconds(s)



#11 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 10 April 2014 - 08:01 AM

Step 2 Georgi---

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : The Reddy Family [Admin rights]
Mode : Scan -- Date : 04/10/2014 07:59:56
| ARK || FAK || MBR |

¤¤¤ Bad processes : 1 ¤¤¤
[SUSP PATH] setup.exe -- C:\Windows\temp\CR_348E1.tmp\setup.exe [7] -> KILLED [TermProc]

¤¤¤ Registry Entries : 4 ¤¤¤
[RUN][SUSP PATH] HKUS\S-1-5-21-596555025-2294599584-2425099006-501\[...]\Run : ROC_ROC_APR2013_AV (C:\Users\Guest\AppData\Roaming\AVG April 2013 Campaign\AVG-Secure-Search-Update.exe /PROMPT --mid 49386242b69847d3be29d168ddea3614-471eae89b9e8a2a9b75b87ef2ddf7c1b38aea1ee --CMPID ROC_APR2013_AV --CMPIDEXTRA 2013 [x][x][x][x]) -> FOUND
[RUN][SUSP PATH] HKUS\S-1-5-21-596555025-2294599584-2425099006-501\[...]\Run : AVG-Secure-Search-Update_0913a (C:\Users\Guest\AppData\Roaming\AVG 0913a Campaign\AVG-Secure-Search-Update-0913a.exe /PROMPT --mid 49386242b69847d3be29d168ddea3614-471eae89b9e8a2a9b75b87ef2ddf7c1b38aea1ee --CMPID 0913a [x][x][x]) -> FOUND
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : DisableRegistryTools (0) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤
[Address] EAT @explorer.exe (DllCanUnloadNow) : api-ms-win-downlevel-shlwapi-l2-1-0.dll -> HOOKED (C:\Windows\System32\AltTab.dll @ 0xF78020D8)
[Address] EAT @explorer.exe (DllGetClassObject) : api-ms-win-downlevel-shlwapi-l2-1-0.dll -> HOOKED (C:\Windows\System32\AltTab.dll @ 0xF78020EC)
[Address] EAT @explorer.exe (BaseReportErrorA) : WSCAPI.dll -> HOOKED (C:\Program Files\Windows Photo Viewer\PhotoBase.dll @ 0xF4651EF4)
[Address] EAT @explorer.exe (BaseReportErrorW) : WSCAPI.dll -> HOOKED (C:\Program Files\Windows Photo Viewer\PhotoBase.dll @ 0xF4651EF4)
[Address] EAT @explorer.exe (DllCanUnloadNow) : api-ms-win-downlevel-shlwapi-l2-1-0.dll -> HOOKED (C:\Windows\System32\AltTab.dll @ 0xF78020D8)
[Address] EAT @explorer.exe (DllGetClassObject) : api-ms-win-downlevel-shlwapi-l2-1-0.dll -> HOOKED (C:\Windows\System32\AltTab.dll @ 0xF78020EC)

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts

127.0.0.1       localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) Hitachi HDS721010CLA332 ATA Device +++++
--- User ---
[MBR] c6f8bf88770b46d5235150c20c9cc9b3
[BSP] 9a33360918245d090f654446c871af72 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 573181 MB
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 1173876736 | Size: 380685 MB
User = LL1 ... OK!
User = LL2 ... OK!

+++++ PhysicalDrive1: (\\.\PHYSICALDRIVE1 @ IDE) Hitachi HDT721010SLA360 ATA Device +++++
--- User ---
[MBR] 53b01bdafab8dd53b24d118a86d26f6c
[BSP] 5d16a4cae75c6a280ea5ea8634f844f5 : Windows XP MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 953867 MB
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_S_04102014_075956.txt >>
RKreport[0]_S_04052014_154151.txt



#12 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 10 April 2014 - 08:18 AM

Georgi---Step 3 was without any threats....



#13 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 10 April 2014 - 08:22 AM

Step 4 Georgi---

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 4/10/2014
Scan Time: 8:20:49 AM
Logfile: mw.txt
Administrator: Yes

Version: 2.00.1.1004
Malware Database: v2014.04.10.04
Rootkit Database: v2014.03.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Chameleon: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: The Reddy Family

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 311852
Time Elapsed: 9 min, 21 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Shuriken: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 1
PUP.Optional.Conduit.A, C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Preferences, Good: (), Bad: (      "search_url": "http://search.conduit.com/Results.aspx?ctid=CT3324790&octid=EB_ORIGINAL_CTID&SearchSource=58&CUI=&UM=4&UP=SPF35B169F-4B88-43B1-9676-9E3329B424BE&q={searchTerms}&SSPV=",), Replaced,[63490d1baccfb1853175ff48709437c9]

Physical Sectors: 0
(No malicious items detected)

(end)



#14 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 10 April 2014 - 08:31 AM

Step 5

 

 

code]
HitmanPro 3.7.9.216
www.hitmanpro.com

   Computer name . . . . : THEREDDYFAMILY
   Windows . . . . . . . : 6.1.1.7601.X64/4
   User name . . . . . . : TheReddyFamily\The Reddy Family
   UAC . . . . . . . . . : Enabled
   License . . . . . . . : Free

   Scan date . . . . . . : 2014-04-10 08:23:17
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 5m 53s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : No

   Threats . . . . . . . : 0
   Traces  . . . . . . . : 64

   Objects scanned . . . : 2,204,834
   Files scanned . . . . : 194,862
   Remnants scanned  . . : 1,071,312 files / 938,660 keys

Potential Unwanted Programs _________________________________________________

   ask.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Web Data

   conduit.search
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Web Data

   ask.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Web Data

   conduit.search
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Web Data

   HKLM\SOFTWARE\Classes\Record\{2009AF2F-5786-3067-8799-B97F7832FDD6}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Record\{915BB7D5-082E-3B91-B1E0-45B5FDE01F24}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Record\{FB2E65F4-5687-33EF-9BBF-4E3C9C98D3B9}\ (FLV Player)
   HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3152E1F19977892449DC968802CE8964\ (FLV Player)
   HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\649A52D257CA5DB4EAAE8BA9EB23E467\ (FLV Player)
   HKU\S-1-5-21-596555025-2294599584-2425099006-501\Software\Microsoft\Internet Explorer\SearchScopes\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}\ (Conduit)

Cookies _____________________________________________________________________

   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.360yield.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.mlnadvertising.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ad.yieldmanager.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.creative-serving.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.p161.net
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.pointroll.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.undertone.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.yahoo.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:adtechus.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:advertising.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:apmebf.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ar.atwola.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:at.atwola.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:atdmt.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:atwola.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:burstnet.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:c.atdmt.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:casalemedia.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:collective-media.net
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:fastclick.net
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:h.atdmt.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:interclick.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:invitemedia.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:media6degrees.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:mediaplex.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:mlarmani.122.2o7.net
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:pointroll.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:pool-eu-ie.creative-serving.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:questionmarket.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:revsci.net
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:ru4.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:serving-sys.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:smartadserver.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:tacoda.at.atwola.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:tribalfusion.com
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:warnerbros.112.2o7.net
   C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Cookies:www.googleadservices.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:ads.yahoo.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:apmebf.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:atdmt.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:burstnet.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:casalemedia.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:fastclick.net
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:interclick.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:mediaplex.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:ru4.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:serving-sys.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:tribalfusion.com
   C:\Users\The Reddy Family\AppData\Local\Google\Chrome\User Data\Default\Cookies:warnerbros.112.2o7.net
   C:\Users\The Reddy Family\AppData\Roaming\Microsoft\Windows\Cookies\1HLKM52Q.txt
   C:\Users\The Reddy Family\AppData\Roaming\Microsoft\Windows\Cookies\5HOWBW06.txt

[/code]



#15 lsmc16

lsmc16
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:09:00 PM

Posted 10 April 2014 - 08:32 AM

Final step---

 

 Results of screen317's Security Check version 0.99.81 
 Windows 7 Service Pack 1 x64 (UAC is enabled) 
 Internet Explorer 11 
``````````````Antivirus/Firewall Check:``````````````
 Windows Firewall Enabled! 
AVG AntiVirus Free Edition 2013  
 Antivirus up to date!  
`````````Anti-malware/Other Utilities Check:`````````
 Adobe Reader XI 
 Google Chrome 33.0.1750.154 
 Google Chrome 34.0.1847.116 
````````Process Check: objlist.exe by Laurent```````` 
 AVG avgwdsvc.exe
`````````````````System Health check`````````````````
 Total Fragmentation on Drive C: 
````````````````````End of Log``````````````````````
 






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users