Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

DDS logs: Audio ads playing in background - Windows 7


  • This topic is locked This topic is locked
25 replies to this topic

#1 tonyroma

tonyroma

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:11 AM

Posted 18 April 2014 - 04:05 PM

Hi everyone,

 

I originally posted this topic here: http://www.bleepingcomputer.com/forums/t/531535/audio-ads-playing-in-background-windows-7/

 

I have extremely annoying audio ads playing in the background. This has been happening for the past 4-6 weeks. These ads show up as 'Name Not Available' in the audio mixer. So far I have used rkill.exe and was told that I have the latest version of the Zekos virus.

 

Thanks in advance for your help. DDS log below:

 

DDS (Ver_2012-11-20.01) - NTFS_x86 
Internet Explorer: 11.0.9600.16521
Run by anausied at 16:52:25 on 2014-04-18
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.3327.1587 [GMT -4:00]
.
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\System32\spoolsv.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Malwarebytes Anti-Malware\mbamscheduler.exe
C:\Program Files\Malwarebytes Anti-Malware\mbamservice.exe
C:\Windows\System32\WUDFHost.exe
C:\Windows\system32\taskhost.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Program Files\Malwarebytes Anti-Malware\mbam.exe
C:\Program Files\McAfee Security Scan\3.8.141\SSScheduler.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\Windows Media Player\wmpnetwk.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Windows\system32\wuauclt.exe
C:\Windows\system32\DllHost.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Program Files\Google\Chrome\Application\chrome.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\conhost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k RPCSS
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\System32\svchost.exe -k LocalServicePeerNet
C:\Windows\System32\svchost.exe -k secsvcs
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
BHO: MSS+ Identifier: {0E8A89AD-95D7-40EB-8D9D-083EF7066A01} - c:\program files\mcafee security scan\3.8.141\McAfeeMSS_IE.dll
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
StartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\mcafee~1.lnk - c:\program files\mcafee security scan\3.8.141\SSScheduler.exe
mPolicies-System: ConsentPromptBehaviorAdmin = dword:5
mPolicies-System: ConsentPromptBehaviorUser = dword:3
mPolicies-System: EnableUIADesktopToggle = dword:0
DPF: {D27CDB6E-AE6D-11CF-96B8-444553540000} - hxxp://fpdownload2.macromedia.com/get/shockwave/cabs/flash/swflash.cab
TCP: NameServer = 75.75.76.76 75.75.75.75
TCP: Interfaces\{2356DB8F-1947-4DEE-8859-A5C6AA5D798E} : DHCPNameServer = 75.75.76.76 75.75.75.75
SSODL: WebCheck - <orphaned>
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\34.0.1847.116\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\anausied\appdata\roaming\mozilla\firefox\profiles\0jy8cas4.default\
FF - plugin: c:\program files\adobe\reader 11.0\reader\air\nppdf32.dll
FF - plugin: c:\program files\google\update\1.3.23.9\npGoogleUpdate3.dll
FF - plugin: c:\program files\mcafee security scan\3.8.141\npMcAfeeMSS.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_11_9_900_170.dll
.
============= SERVICES / DRIVERS ===============
.
R2 MBAMScheduler;MBAMScheduler;c:\program files\malwarebytes anti-malware\mbamscheduler.exe [2014-4-5 1809720]
R2 MBAMService;MBAMService;c:\program files\malwarebytes anti-malware\mbamservice.exe [2014-4-5 857912]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2014-4-5 23256]
R3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\MBAMSwissArmy.sys [2014-4-5 107736]
R3 MBAMWebAccessControl;MBAMWebAccessControl;c:\windows\system32\drivers\mwac.sys [2014-4-5 51416]
R3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\drivers\Rt86win7.sys [2009-6-10 139776]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2013-9-11 105144]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2009-7-13 229888]
S3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\ieetwcollector.exe [2014-3-15 108032]
S3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\mcafee security scan\3.8.141\McCHSvc.exe [2014-1-15 235696]
S3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\TsUsbFlt.sys [2010-11-20 52224]
S3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-20 27264]
S3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\wat\WatAdminSvc.exe [2013-12-23 1343400]
S3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\drivers\wdcsam.sys [2008-5-6 11520]
.
=============== Created Last 30 ================
.
2014-04-18 17:34:17 -------- d-----w- c:\users\anausied\appdata\local\CrashDumps
2014-04-18 17:33:42 -------- d-----w- c:\users\anausied\appdata\local\Google
2014-04-18 17:33:33 -------- d-----w- c:\users\anausied\appdata\local\Deployment
2014-04-18 17:33:33 -------- d-----w- c:\users\anausied\appdata\local\Apps
2014-04-18 17:21:29 -------- d-----w- c:\windows\ERUNT
2014-04-18 15:58:35 8050496 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{f49877f5-f851-4c10-8f24-790c192934f0}\mpengine.dll
2014-04-18 07:01:46 -------- d-----w- c:\windows\Migration
2014-04-10 16:17:43 45568 ----a-w- c:\users\anausied\appdata\roaming\bunfq.dll
2014-04-09 13:28:01 27072 ----a-w- c:\windows\system32\drivers\Diskdump.sys
2014-04-09 13:28:01 234432 ----a-w- c:\windows\system32\drivers\msiscsi.sys
2014-04-09 13:28:01 2048 ----a-w- c:\windows\system32\iologmsg.dll
2014-04-09 13:28:01 149440 ----a-w- c:\windows\system32\drivers\storport.sys
2014-04-09 13:28:00 1212352 ----a-w- c:\windows\system32\drivers\ntfs.sys
2014-04-09 13:27:59 2724864 ----a-w- c:\windows\system32\mshtml.tlb
2014-04-06 23:25:38 185344 ----a-w- c:\windows\system32\wwansvc.dll
2014-04-06 23:25:36 1230336 ----a-w- c:\windows\system32\WindowsCodecs.dll
2014-04-06 23:25:35 594944 ----a-w- c:\windows\system32\RMActivate_isv.exe
2014-04-06 23:25:35 572416 ----a-w- c:\windows\system32\RMActivate.exe
2014-04-06 23:25:34 87040 ----a-w- c:\windows\system32\secproc_ssp_isv.dll
2014-04-06 23:25:34 87040 ----a-w- c:\windows\system32\secproc_ssp.dll
2014-04-06 23:25:34 510976 ----a-w- c:\windows\system32\RMActivate_ssp.exe
2014-04-06 23:25:34 508928 ----a-w- c:\windows\system32\RMActivate_ssp_isv.exe
2014-04-06 23:25:34 428032 ----a-w- c:\windows\system32\secproc.dll
2014-04-06 23:25:34 423936 ----a-w- c:\windows\system32\secproc_isv.dll
2014-04-06 23:25:34 390144 ----a-w- c:\windows\system32\msdrm.dll
2014-04-05 16:33:52 107736 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-04-05 16:33:42 73432 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-04-05 16:33:42 51416 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-04-05 16:33:42 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-04-05 16:33:42 -------- d-----w- c:\programdata\Malwarebytes
2014-04-05 16:33:42 -------- d-----w- c:\program files\Malwarebytes Anti-Malware
2014-04-05 16:33:32 -------- d-----w- c:\users\anausied\appdata\local\Programs
2014-04-05 04:03:21 -------- d-----w- c:\users\anausied\appdata\local\WinZip
.
==================== Find3M  ====================
.
2014-03-31 13:35:10 231584 ------w- c:\windows\system32\MpSigStub.exe
2014-03-01 04:10:48 4096 ----a-w- c:\windows\system32\ieetwcollectorres.dll
2014-03-01 03:52:43 61952 ----a-w- c:\windows\system32\iesetup.dll
2014-03-01 03:51:53 51200 ----a-w- c:\windows\system32\ieetwproxystub.dll
2014-03-01 03:38:26 112128 ----a-w- c:\windows\system32\ieUnatt.exe
2014-03-01 03:38:23 108032 ----a-w- c:\windows\system32\ieetwcollector.exe
2014-03-01 03:37:35 553472 ----a-w- c:\windows\system32\jscript9diag.dll
2014-03-01 03:31:30 646144 ----a-w- c:\windows\system32\MsSpellCheckingFacility.exe
2014-03-01 03:14:15 4244480 ----a-w- c:\windows\system32\jscript9.dll
2014-03-01 03:00:08 1964032 ----a-w- c:\windows\system32\inetcpl.cpl
2014-03-01 02:32:16 1820160 ----a-w- c:\windows\system32\wininet.dll
2014-02-07 01:07:56 2349056 ----a-w- c:\windows\system32\win32k.sys
2014-02-04 02:04:11 509440 ----a-w- c:\windows\system32\qedit.dll
2014-01-29 02:06:47 381440 ----a-w- c:\windows\system32\wer.dll
.
============= FINISH: 16:54:21.36 ===============
 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 19 April 2014 - 06:53 AM




Hello tonyroma

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.
.





I would like you to run this program for me.

Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.
  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
.





I would also like to get some extra information on one of the files on the computer

Run FRST like you did before and Type the following in the edit box after "Search:".

rpcss.dll

It then should look like:

Search: rpcss.dll

Click Search button and post the log (Search.txt) it makes to your reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 tonyroma

tonyroma
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:11 AM

Posted 19 April 2014 - 12:11 PM

Thanks Gringo. Below is the text from the FRST.txt file:

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version: 19-04-2014
Ran by anausied (administrator) on ANAUSIED-PC on 19-04-2014 12:56:54
Running from C:\Users\anausied\Downloads
Microsoft Windows 7 Home Premium  Service Pack 1 (X86) OS Language: English(US)
Internet Explorer Version 11
Boot Mode: Normal
 
The only official download link for FRST:
Download link from any site other than Bleeping Computer is unpermitted or outdated.
 
==================== Processes (Whitelisted) =================
 
(Malwarebytes Corporation) C:\Program Files\Malwarebytes Anti-Malware\mbam.exe
(McAfee, Inc.) C:\Program Files\McAfee Security Scan\3.8.141\SSScheduler.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
(Microsoft Corporation) C:\Windows\system32\wuauclt.exe
(Google Inc.) C:\Program Files\Google\Chrome\Application\chrome.exe
 
 
==================== Registry (Whitelisted) ==================
 
HKLM\...\Run: [Adobe ARM] => C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-21] (Adobe Systems Incorporated)
 
==================== Internet (Whitelisted) ====================
 
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://www.msn.com/?ocid=iehp
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache_TIMESTAMP = 0x4662F9CC50FFCE01
HKCU\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache AcceptLangs = en-us
SearchScopes: HKLM - DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search
SearchScopes: HKLM - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search
SearchScopes: HKCU - DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search
SearchScopes: HKCU - {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search
BHO: MSS+ Identifier - {0E8A89AD-95D7-40EB-8D9D-083EF7066A01} - C:\Program Files\McAfee Security Scan\3.8.141\McAfeeMSS_IE.dll (McAfee, Inc.)
Tcpip\Parameters: [DhcpNameServer] 75.75.76.76 75.75.75.75
 
FireFox:
========
FF ProfilePath: C:\Users\anausied\AppData\Roaming\Mozilla\Firefox\Profiles\0jy8cas4.default
FF Plugin: @adobe.com/FlashPlayer - C:\Windows\system32\Macromed\Flash\NPSWF32_11_9_900_170.dll ()
FF Plugin: @mcafee.com/McAfeeMssPlugin - C:\Program Files\McAfee Security Scan\3.8.141\npMcAfeeMss.dll (McAfee, Inc.)
FF Plugin: @microsoft.com/GENUINE - disabled No File
FF Plugin: @tools.google.com/Google Update;version=3 - C:\Program Files\Google\Update\1.3.23.9\npGoogleUpdate3.dll (Google Inc.)
FF Plugin: @tools.google.com/Google Update;version=9 - C:\Program Files\Google\Update\1.3.23.9\npGoogleUpdate3.dll (Google Inc.)
FF Plugin: Adobe Reader - C:\Program Files\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF Extension: Cor Remote Loader, CorLoad, CorLoad 1 - C:\Users\anausied\AppData\Roaming\Mozilla\Firefox\Profiles\0jy8cas4.default\Extensions\{DC55D1B2-D0FB-7550-74E2-B6A8445CA659} [2013-12-23]
 
Chrome: 
=======
CHR Extension: (Google Docs) - C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2014-04-18]
CHR Extension: (Google Drive) - C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2014-04-18]
CHR Extension: (YouTube) - C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2014-04-18]
CHR Extension: (McAfee Security Scan+) - C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\bopakagnckmlgajfccecajhnimjiiedh [2014-04-18]
CHR Extension: (Google Search) - C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2014-04-18]
CHR Extension: (Google Wallet) - C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2014-04-18]
CHR Extension: (Gmail) - C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2014-04-18]
 
========================== Services (Whitelisted) =================
 
S3 McComponentHostService; C:\Program Files\McAfee Security Scan\3.8.141\McCHSvc.exe [235696 2014-01-15] (McAfee, Inc.)
 
==================== Drivers (Whitelisted) ====================
 
S3 LUsbFilt; C:\Windows\System32\Drivers\LUsbFilt.Sys [28944 2008-02-29] (Logitech, Inc.)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [107736 2014-04-19] (Malwarebytes Corporation)
R3 MTsensor; C:\Windows\System32\DRIVERS\ASACPI.sys [5810 2004-08-13] ()
U3 mbr; \??\C:\Users\anausied\AppData\Local\Temp\mbr.sys [X]
 
==================== NetSvcs (Whitelisted) ===================
 
 
==================== One Month Created Files and Folders ========
 
2014-04-19 12:56 - 2014-04-19 12:57 - 00005575 _____ () C:\Users\anausied\Downloads\FRST.txt
2014-04-19 12:56 - 2014-04-19 12:56 - 01043968 _____ (Farbar) C:\Users\anausied\Downloads\FRST.exe
2014-04-19 12:56 - 2014-04-19 12:56 - 00000000 ____D () C:\FRST
2014-04-19 11:56 - 2014-04-19 11:56 - 00000000 ____S () C:\Windows\system32\mwwf.zri
2014-04-18 16:54 - 2014-04-18 16:54 - 00008876 _____ () C:\Users\anausied\Desktop\dds.txt
2014-04-18 16:54 - 2014-04-18 16:54 - 00001653 _____ () C:\Users\anausied\Desktop\attach.txt
2014-04-18 16:51 - 2014-04-18 16:52 - 00688992 ____R (Swearware) C:\Users\anausied\Downloads\dds.com
2014-04-18 14:09 - 2014-04-18 14:10 - 00002630 _____ () C:\Users\anausied\Desktop\Rkill.txt
2014-04-18 14:09 - 2014-04-18 14:09 - 01933048 _____ (Bleeping Computer, LLC) C:\Users\anausied\Downloads\rkill.exe
2014-04-18 13:35 - 2014-04-18 13:36 - 04118280 _____ () C:\Users\anausied\Downloads\tdsskiller (1).zip
2014-04-18 13:34 - 2014-04-18 13:34 - 00002201 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2014-04-18 13:34 - 2014-04-18 13:34 - 00000000 ____D () C:\Users\anausied\AppData\Local\CrashDumps
2014-04-18 13:33 - 2014-04-19 12:44 - 00000890 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-04-18 13:33 - 2014-04-18 14:16 - 00000886 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-04-18 13:33 - 2014-04-18 13:34 - 00000000 ____D () C:\Users\anausied\AppData\Local\Google
2014-04-18 13:33 - 2014-04-18 13:34 - 00000000 ____D () C:\Program Files\Google
2014-04-18 13:33 - 2014-04-18 13:33 - 00000000 ____D () C:\Users\anausied\AppData\Local\Deployment
2014-04-18 13:33 - 2014-04-18 13:33 - 00000000 ____D () C:\Users\anausied\AppData\Local\Apps\2.0
2014-04-18 13:21 - 2014-04-18 13:21 - 00000000 ____D () C:\Windows\ERUNT
2014-04-18 13:08 - 2014-04-18 13:13 - 00000000 ____D () C:\Users\anausied\Desktop\RK_Quarantine
2014-04-18 13:06 - 2014-04-18 13:06 - 00001087 _____ () C:\Users\anausied\Desktop\Continue Software Installation Installation.lnk
2014-04-18 13:01 - 2014-04-18 13:01 - 00000000 ____S () C:\Windows\system32\ouopqk.gsq
2014-04-16 00:30 - 2014-04-16 00:30 - 00000000 ____S () C:\Windows\system32\wakd.arc
2014-04-15 20:14 - 2014-04-15 20:14 - 00000000 ____S () C:\Windows\system32\shkho.iqo
2014-04-14 12:33 - 2014-04-14 15:08 - 00000000 ____D () C:\Users\anausied\Desktop\Docs for 44 Hampton
2014-04-11 15:04 - 2014-04-11 15:04 - 00000000 ____S () C:\Windows\system32\fqfj.rvv
2014-04-10 12:17 - 2014-04-10 12:17 - 00045568 _____ (Microsoft Corporation) C:\Users\anausied\AppData\Roaming\bunfq.dll
2014-04-10 12:17 - 2014-04-10 12:17 - 00000000 ____S () C:\Windows\system32\enstnmq.cjd
2014-04-10 03:01 - 2014-04-10 03:01 - 00000000 ____S () C:\Windows\system32\voxu.zyz
2014-04-09 15:55 - 2014-04-09 15:55 - 00000000 ____S () C:\Windows\system32\gdunj.qgn
2014-04-09 09:28 - 2014-03-30 19:57 - 17073152 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-04-09 09:28 - 2014-03-04 05:17 - 00868352 _____ (Microsoft Corporation) C:\Windows\system32\kernel32.dll
2014-04-09 09:28 - 2014-02-03 22:07 - 00234432 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\msiscsi.sys
2014-04-09 09:28 - 2014-02-03 22:07 - 00149440 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\storport.sys
2014-04-09 09:28 - 2014-02-03 22:07 - 00027072 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\Diskdump.sys
2014-04-09 09:28 - 2014-02-03 22:00 - 00002048 _____ (Microsoft Corporation) C:\Windows\system32\iologmsg.dll
2014-04-09 09:28 - 2014-01-23 22:18 - 01212352 _____ (Microsoft Corporation) C:\Windows\system32\Drivers\ntfs.sys
2014-04-09 09:27 - 2014-03-30 20:13 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-04-07 01:48 - 2014-04-07 01:48 - 00000000 ____S () C:\Windows\system32\fyvk.wyr
2014-04-06 20:30 - 2014-04-06 20:30 - 00000000 ____S () C:\Windows\system32\xklzlr.phs
2014-04-06 19:25 - 2014-02-03 22:04 - 01230336 _____ (Microsoft Corporation) C:\Windows\system32\WindowsCodecs.dll
2014-04-06 19:25 - 2014-01-27 22:07 - 00185344 _____ (Microsoft Corporation) C:\Windows\system32\wwansvc.dll
2014-04-06 19:25 - 2013-12-31 19:05 - 00420008 _____ () C:\Windows\system32\locale.nls
2014-04-06 19:25 - 2013-12-03 22:03 - 00428032 _____ (Microsoft Corporation) C:\Windows\system32\secproc.dll
2014-04-06 19:25 - 2013-12-03 22:03 - 00423936 _____ (Microsoft Corporation) C:\Windows\system32\secproc_isv.dll
2014-04-06 19:25 - 2013-12-03 22:03 - 00087040 _____ (Microsoft Corporation) C:\Windows\system32\secproc_ssp_isv.dll
2014-04-06 19:25 - 2013-12-03 22:03 - 00087040 _____ (Microsoft Corporation) C:\Windows\system32\secproc_ssp.dll
2014-04-06 19:25 - 2013-12-03 22:02 - 00390144 _____ (Microsoft Corporation) C:\Windows\system32\msdrm.dll
2014-04-06 19:25 - 2013-12-03 21:54 - 00594944 _____ (Microsoft Corporation) C:\Windows\system32\RMActivate_isv.exe
2014-04-06 19:25 - 2013-12-03 21:54 - 00572416 _____ (Microsoft Corporation) C:\Windows\system32\RMActivate.exe
2014-04-06 19:25 - 2013-12-03 21:54 - 00510976 _____ (Microsoft Corporation) C:\Windows\system32\RMActivate_ssp.exe
2014-04-06 19:25 - 2013-12-03 21:54 - 00508928 _____ (Microsoft Corporation) C:\Windows\system32\RMActivate_ssp_isv.exe
2014-04-06 14:47 - 2014-04-06 14:47 - 00000000 ____S () C:\Windows\system32\edaut.qyy
2014-04-06 01:11 - 2014-04-06 01:11 - 00000000 ____S () C:\Windows\system32\luzq.bvj
2014-04-05 13:36 - 2014-04-05 13:36 - 00000000 ____S () C:\Windows\system32\judasn.rkb
2014-04-05 12:33 - 2014-04-19 11:48 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-05 12:33 - 2014-04-05 12:33 - 00001060 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-04-05 12:33 - 2014-04-05 12:33 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-05 12:33 - 2014-04-05 12:33 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-04-05 12:33 - 2014-04-03 09:51 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-05 12:33 - 2014-04-03 09:51 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-05 12:33 - 2014-04-03 09:50 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-05 12:30 - 2014-04-05 12:30 - 04118888 _____ () C:\Users\anausied\Downloads\tdsskiller.zip
2014-04-05 12:30 - 2014-04-05 12:30 - 02237968 _____ (Kaspersky Lab ZAO) C:\Users\anausied\Downloads\tdsskiller.exe
2014-04-05 00:03 - 2014-04-05 00:03 - 00831384 _____ () C:\Users\anausied\Downloads\winzip180-lan_en (1).exe
2014-04-05 00:03 - 2014-04-05 00:03 - 00002277 _____ () C:\Users\Public\Desktop\WinZip.lnk
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\Users\anausied\AppData\Local\WinZip
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\ProgramData\WinZip
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\ProgramData\Real
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\Program Files\WinZip
2014-04-05 00:02 - 2014-04-05 00:02 - 00831384 _____ () C:\Users\anausied\Downloads\winzip180-lan_en.exe
2014-04-02 22:33 - 2014-04-02 22:33 - 00000000 ____S () C:\Windows\system32\zqxd.mjl
2014-04-02 17:09 - 2014-04-02 17:09 - 00000000 ____S () C:\Windows\system32\wpugr.zmo
2014-04-01 22:10 - 2014-04-01 22:10 - 00000000 ____S () C:\Windows\system32\ipkji.ymf
2014-03-31 22:39 - 2014-03-31 22:39 - 00000000 ____S () C:\Windows\system32\rklsse.tbf
2014-03-31 20:47 - 2014-04-19 12:36 - 00000083 _____ () C:\Windows\system32\jazu.nbq
2014-03-31 20:36 - 2014-03-31 20:36 - 00000064 _____ () C:\Windows\system32\hmuhi.ham
2014-03-31 20:36 - 2014-03-31 20:36 - 00000000 _____ () C:\Windows\system32\nqvt.nsg
2014-03-31 20:20 - 2014-03-31 20:20 - 00299344 ____S () C:\Windows\system32\fqppqe.rph
2014-03-29 16:53 - 2014-03-29 16:53 - 00000000 ____D () C:\Program Files\Mozilla Firefox
 
==================== One Month Modified Files and Folders =======
 
2014-04-19 12:57 - 2014-04-19 12:56 - 00005575 _____ () C:\Users\anausied\Downloads\FRST.txt
2014-04-19 12:56 - 2014-04-19 12:56 - 01043968 _____ (Farbar) C:\Users\anausied\Downloads\FRST.exe
2014-04-19 12:56 - 2014-04-19 12:56 - 00000000 ____D () C:\FRST
2014-04-19 12:44 - 2014-04-18 13:33 - 00000890 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2014-04-19 12:36 - 2014-03-31 20:47 - 00000083 _____ () C:\Windows\system32\jazu.nbq
2014-04-19 11:56 - 2014-04-19 11:56 - 00000000 ____S () C:\Windows\system32\mwwf.zri
2014-04-19 11:54 - 2013-12-22 18:52 - 01067288 _____ () C:\Windows\WindowsUpdate.log
2014-04-19 11:48 - 2014-04-05 12:33 - 00107736 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-04-19 03:08 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\Microsoft.NET
2014-04-19 03:01 - 2010-11-20 17:01 - 00773536 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-04-18 16:54 - 2014-04-18 16:54 - 00008876 _____ () C:\Users\anausied\Desktop\dds.txt
2014-04-18 16:54 - 2014-04-18 16:54 - 00001653 _____ () C:\Users\anausied\Desktop\attach.txt
2014-04-18 16:52 - 2014-04-18 16:51 - 00688992 ____R (Swearware) C:\Users\anausied\Downloads\dds.com
2014-04-18 14:23 - 2009-07-14 00:34 - 00021872 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-04-18 14:23 - 2009-07-14 00:34 - 00021872 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-04-18 14:16 - 2014-04-18 13:33 - 00000886 _____ () C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2014-04-18 14:16 - 2009-07-14 00:53 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-04-18 14:16 - 2009-07-14 00:39 - 00027505 _____ () C:\Windows\setupact.log
2014-04-18 14:15 - 2010-11-20 17:48 - 00056020 _____ () C:\Windows\PFRO.log
2014-04-18 14:10 - 2014-04-18 14:09 - 00002630 _____ () C:\Users\anausied\Desktop\Rkill.txt
2014-04-18 14:09 - 2014-04-18 14:09 - 01933048 _____ (Bleeping Computer, LLC) C:\Users\anausied\Downloads\rkill.exe
2014-04-18 13:36 - 2014-04-18 13:35 - 04118280 _____ () C:\Users\anausied\Downloads\tdsskiller (1).zip
2014-04-18 13:34 - 2014-04-18 13:34 - 00002201 _____ () C:\Users\Public\Desktop\Google Chrome.lnk
2014-04-18 13:34 - 2014-04-18 13:34 - 00000000 ____D () C:\Users\anausied\AppData\Local\CrashDumps
2014-04-18 13:34 - 2014-04-18 13:33 - 00000000 ____D () C:\Users\anausied\AppData\Local\Google
2014-04-18 13:34 - 2014-04-18 13:33 - 00000000 ____D () C:\Program Files\Google
2014-04-18 13:33 - 2014-04-18 13:33 - 00000000 ____D () C:\Users\anausied\AppData\Local\Deployment
2014-04-18 13:33 - 2014-04-18 13:33 - 00000000 ____D () C:\Users\anausied\AppData\Local\Apps\2.0
2014-04-18 13:21 - 2014-04-18 13:21 - 00000000 ____D () C:\Windows\ERUNT
2014-04-18 13:13 - 2014-04-18 13:08 - 00000000 ____D () C:\Users\anausied\Desktop\RK_Quarantine
2014-04-18 13:06 - 2014-04-18 13:06 - 00001087 _____ () C:\Users\anausied\Desktop\Continue Software Installation Installation.lnk
2014-04-18 13:01 - 2014-04-18 13:01 - 00000000 ____S () C:\Windows\system32\ouopqk.gsq
2014-04-16 00:30 - 2014-04-16 00:30 - 00000000 ____S () C:\Windows\system32\wakd.arc
2014-04-15 20:14 - 2014-04-15 20:14 - 00000000 ____S () C:\Windows\system32\shkho.iqo
2014-04-14 15:08 - 2014-04-14 12:33 - 00000000 ____D () C:\Users\anausied\Desktop\Docs for 44 Hampton
2014-04-12 12:26 - 2013-12-22 20:59 - 00000000 ____D () C:\Users\anausied\Documents\Car parts
2014-04-11 15:04 - 2014-04-11 15:04 - 00000000 ____S () C:\Windows\system32\fqfj.rvv
2014-04-11 14:33 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\rescache
2014-04-10 12:17 - 2014-04-10 12:17 - 00045568 _____ (Microsoft Corporation) C:\Users\anausied\AppData\Roaming\bunfq.dll
2014-04-10 12:17 - 2014-04-10 12:17 - 00000000 ____S () C:\Windows\system32\enstnmq.cjd
2014-04-10 03:01 - 2014-04-10 03:01 - 00000000 ____S () C:\Windows\system32\voxu.zyz
2014-04-09 15:55 - 2014-04-09 15:55 - 00000000 ____S () C:\Windows\system32\gdunj.qgn
2014-04-07 01:48 - 2014-04-07 01:48 - 00000000 ____S () C:\Windows\system32\fyvk.wyr
2014-04-06 20:30 - 2014-04-06 20:30 - 00000000 ____S () C:\Windows\system32\xklzlr.phs
2014-04-06 14:47 - 2014-04-06 14:47 - 00000000 ____S () C:\Windows\system32\edaut.qyy
2014-04-06 01:11 - 2014-04-06 01:11 - 00000000 ____S () C:\Windows\system32\luzq.bvj
2014-04-05 13:36 - 2014-04-05 13:36 - 00000000 ____S () C:\Windows\system32\judasn.rkb
2014-04-05 12:51 - 2009-07-13 22:37 - 00000000 ____D () C:\Windows\system
2014-04-05 12:33 - 2014-04-05 12:33 - 00001060 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-04-05 12:33 - 2014-04-05 12:33 - 00000000 ____D () C:\ProgramData\Malwarebytes
2014-04-05 12:33 - 2014-04-05 12:33 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-04-05 12:30 - 2014-04-05 12:30 - 04118888 _____ () C:\Users\anausied\Downloads\tdsskiller.zip
2014-04-05 12:30 - 2014-04-05 12:30 - 02237968 _____ (Kaspersky Lab ZAO) C:\Users\anausied\Downloads\tdsskiller.exe
2014-04-05 00:03 - 2014-04-05 00:03 - 00831384 _____ () C:\Users\anausied\Downloads\winzip180-lan_en (1).exe
2014-04-05 00:03 - 2014-04-05 00:03 - 00002277 _____ () C:\Users\Public\Desktop\WinZip.lnk
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\Users\anausied\AppData\Local\WinZip
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\ProgramData\WinZip
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\ProgramData\Real
2014-04-05 00:03 - 2014-04-05 00:03 - 00000000 ____D () C:\Program Files\WinZip
2014-04-05 00:02 - 2014-04-05 00:02 - 00831384 _____ () C:\Users\anausied\Downloads\winzip180-lan_en.exe
2014-04-04 23:54 - 2013-12-22 15:59 - 00000000 ____D () C:\Users\anausied\AppData\Local\VirtualStore
2014-04-03 09:51 - 2014-04-05 12:33 - 00073432 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-04-03 09:51 - 2014-04-05 12:33 - 00051416 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-04-03 09:50 - 2014-04-05 12:33 - 00023256 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-04-02 22:33 - 2014-04-02 22:33 - 00000000 ____S () C:\Windows\system32\zqxd.mjl
2014-04-02 17:09 - 2014-04-02 17:09 - 00000000 ____S () C:\Windows\system32\wpugr.zmo
2014-04-01 22:10 - 2014-04-01 22:10 - 00000000 ____S () C:\Windows\system32\ipkji.ymf
2014-03-31 22:39 - 2014-03-31 22:39 - 00000000 ____S () C:\Windows\system32\rklsse.tbf
2014-03-31 20:36 - 2014-03-31 20:36 - 00000064 _____ () C:\Windows\system32\hmuhi.ham
2014-03-31 20:36 - 2014-03-31 20:36 - 00000000 _____ () C:\Windows\system32\nqvt.nsg
2014-03-31 20:20 - 2014-03-31 20:20 - 00299344 ____S () C:\Windows\system32\fqppqe.rph
2014-03-31 09:35 - 2013-12-22 16:13 - 00231584 ____N (Microsoft Corporation) C:\Windows\system32\MpSigStub.exe
2014-03-30 20:13 - 2014-04-09 09:27 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-03-30 19:57 - 2014-04-09 09:28 - 17073152 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-03-29 23:26 - 2013-12-22 19:01 - 00000000 ____D () C:\Program Files\Mozilla Maintenance Service
2014-03-29 16:53 - 2014-03-29 16:53 - 00000000 ____D () C:\Program Files\Mozilla Firefox
 
Some content of TEMP:
====================
C:\Users\anausied\AppData\Local\Temp\fp_pl_pfs_installer.exe
C:\Users\anausied\AppData\Local\Temp\ICReinstall_setup.exe
C:\Users\anausied\AppData\Local\Temp\lowproc.exe
C:\Users\anausied\AppData\Local\Temp\ntdll_dump.dll
C:\Users\anausied\AppData\Local\Temp\stubhelper.dll
 
 
==================== Bamital & volsnap Check =================
 
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\system32\winlogon.exe => MD5 is legit
C:\Windows\system32\wininit.exe => MD5 is legit
C:\Windows\system32\svchost.exe => MD5 is legit
C:\Windows\system32\services.exe => MD5 is legit
C:\Windows\system32\User32.dll => MD5 is legit
C:\Windows\system32\userinit.exe => MD5 is legit
C:\Windows\system32\rpcss.dll
[2010-11-20 17:29] - [2010-11-20 17:29] - 0378368 ____A (Microsoft Corporation) CBBDE5256B2B5CE31793C760692A7422
 
 ATTENTION ======> If the system is having audio adware rpcss.dll is patched. Google the MD5, if the MD5 is unique the file is infected.
C:\Windows\system32\Drivers\volsnap.sys => MD5 is legit
 
 
LastRegBack: 2014-04-09 10:08
 
==================== End Of Log ============================
 
Below is the search.txt file:
 
Farbar Recovery Scan Tool (x86) Version: 19-04-2014
Ran by anausied at 2014-04-19 13:03:19
Running from C:\Users\anausied\Downloads
Boot Mode: Normal
 
================== Search: "rpcss.dll" ===================
 
C:\Windows.old\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_6bd245e79c221747\rpcss.dll
[2010-11-20 17:29] - [2010-11-20 17:29] - 0376832 ____A (Microsoft Corporation) 7660F01D3B38ACA1747E397D21D790AF
 
C:\Windows.old\Windows\System32\rpcss.dll
[2010-11-20 17:29] - [2010-11-20 17:29] - 0376832 ____A (Microsoft Corporation) 7660F01D3B38ACA1747E397D21D790AF
 
C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_6bd245e79c221747\rpcss.dll
[2010-11-20 17:29] - [2010-11-20 17:29] - 0376832 ____A (Microsoft Corporation) 7660F01D3B38ACA1747E397D21D790AF
 
C:\Windows\System32\rpcss.dll
[2010-11-20 17:29] - [2010-11-20 17:29] - 0378368 ____A (Microsoft Corporation) CBBDE5256B2B5CE31793C760692A7422
 
=== End Of Search ===


#4 tonyroma

tonyroma
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:11 AM

Posted 19 April 2014 - 12:13 PM

Attached is the addition.txt file.

Attached Files



#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 19 April 2014 - 03:37 PM

Hello tonyroma



I need you to download this script I have made for you --> Attached File  fixlist.txt   2.08KB   1 downloads

It needs to be saved Next to the "Farbar Recovery Scan Tool" (FRST) program (If asked to overwrite existing one please allow)

Run FRST again but this time press the Fix button just once and wait.


When finished, it will make a log (fixlog.txt) next to FRST. Please copy and paste the content of this file to your reply.


NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system


Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 tonyroma

tonyroma
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:11 AM

Posted 20 April 2014 - 04:24 PM

Thank you! Here it is:

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x86) Version: 19-04-2014
Ran by anausied at 2014-04-20 17:21:19 Run:1
Running from C:\Users\anausied\Downloads
Boot Mode: Normal
 
==============================================
 
Content of fixlist:
*****************
2014-04-18 13:01 - 2014-04-18 13:01 - 00000000 ____S () C:\Windows\system32\ouopqk.gsq
2014-04-16 00:30 - 2014-04-16 00:30 - 00000000 ____S () C:\Windows\system32\wakd.arc
2014-04-15 20:14 - 2014-04-15 20:14 - 00000000 ____S () C:\Windows\system32\shkho.iqo
2014-04-11 15:04 - 2014-04-11 15:04 - 00000000 ____S () C:\Windows\system32\fqfj.rvv
2014-04-10 12:17 - 2014-04-10 12:17 - 00000000 ____S () C:\Windows\system32\enstnmq.cjd
2014-04-10 03:01 - 2014-04-10 03:01 - 00000000 ____S () C:\Windows\system32\voxu.zyz
2014-04-09 15:55 - 2014-04-09 15:55 - 00000000 ____S () C:\Windows\system32\gdunj.qgn
2014-04-07 01:48 - 2014-04-07 01:48 - 00000000 ____S () C:\Windows\system32\fyvk.wyr
2014-04-06 20:30 - 2014-04-06 20:30 - 00000000 ____S () C:\Windows\system32\xklzlr.phs
2014-04-06 14:47 - 2014-04-06 14:47 - 00000000 ____S () C:\Windows\system32\edaut.qyy
2014-04-06 01:11 - 2014-04-06 01:11 - 00000000 ____S () C:\Windows\system32\luzq.bvj
2014-04-05 13:36 - 2014-04-05 13:36 - 00000000 ____S () C:\Windows\system32\judasn.rkb
2014-04-02 22:33 - 2014-04-02 22:33 - 00000000 ____S () C:\Windows\system32\zqxd.mjl
2014-04-02 17:09 - 2014-04-02 17:09 - 00000000 ____S () C:\Windows\system32\wpugr.zmo
2014-04-01 22:10 - 2014-04-01 22:10 - 00000000 ____S () C:\Windows\system32\ipkji.ymf
2014-03-31 22:39 - 2014-03-31 22:39 - 00000000 ____S () C:\Windows\system32\rklsse.tbf
2014-03-31 20:47 - 2014-04-19 12:36 - 00000083 _____ () C:\Windows\system32\jazu.nbq
2014-03-31 20:36 - 2014-03-31 20:36 - 00000064 _____ () C:\Windows\system32\hmuhi.ham
2014-03-31 20:36 - 2014-03-31 20:36 - 00000000 _____ () C:\Windows\system32\nqvt.nsg
2014-03-31 20:20 - 2014-03-31 20:20 - 00299344 ____S () C:\Windows\system32\fqppqe.rph
2014-04-10 12:17 - 2014-04-10 12:17 - 00045568 _____ (Microsoft Corporation) C:\Users\anausied\AppData\Roaming\bunfq.dll
2014-04-19 11:56 - 2014-04-19 11:56 - 00000000 ____S () C:\Windows\system32\mwwf.zri
Replace: C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_6bd245e79c221747\rpcss.dll C:\WINDOWS\System32\rpcss.dll
 
 
 
 
 
 
 
 
 
 
*****************
 
C:\Windows\system32\ouopqk.gsq => Moved successfully.
C:\Windows\system32\wakd.arc => Moved successfully.
C:\Windows\system32\shkho.iqo => Moved successfully.
C:\Windows\system32\fqfj.rvv => Moved successfully.
C:\Windows\system32\enstnmq.cjd => Moved successfully.
C:\Windows\system32\voxu.zyz => Moved successfully.
C:\Windows\system32\gdunj.qgn => Moved successfully.
C:\Windows\system32\fyvk.wyr => Moved successfully.
C:\Windows\system32\xklzlr.phs => Moved successfully.
C:\Windows\system32\edaut.qyy => Moved successfully.
C:\Windows\system32\luzq.bvj => Moved successfully.
C:\Windows\system32\judasn.rkb => Moved successfully.
C:\Windows\system32\zqxd.mjl => Moved successfully.
C:\Windows\system32\wpugr.zmo => Moved successfully.
C:\Windows\system32\ipkji.ymf => Moved successfully.
C:\Windows\system32\rklsse.tbf => Moved successfully.
C:\Windows\system32\jazu.nbq => Moved successfully.
C:\Windows\system32\hmuhi.ham => Moved successfully.
Could not move "C:\Windows\system32\nqvt.nsg" => Scheduled to move on reboot.
Could not move "C:\Windows\system32\fqppqe.rph" => Scheduled to move on reboot.
C:\Users\anausied\AppData\Roaming\bunfq.dll => Moved successfully.
C:\Windows\system32\mwwf.zri => Moved successfully.
C:\WINDOWS\System32\rpcss.dll => Moved successfully.
C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7601.17514_none_6bd245e79c221747\rpcss.dll copied successfully to C:\WINDOWS\System32\rpcss.dll
 
=> Result of Scheduled Files to move (Boot Mode: Normal) (Date&Time: 2014-04-20 17:23:03)<=
 
C:\Windows\system32\nqvt.nsg => Is moved successfully.
C:\Windows\system32\fqppqe.rph => Is moved successfully.
 
==== End of Fixlog ====


#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 20 April 2014 - 07:58 PM



Hello tonyroma

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 23 April 2014 - 07:23 AM


Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 26 April 2014 - 06:17 AM



Hello

48 Hour bump

It has been more than 48 hours since my last post.
  • do you still need help with this?
  • do you need more time?
  • are you having problems following my instructions?
  • if after 48hrs you have not replied to this thread then it will have to be closed!
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 tonyroma

tonyroma
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:11 AM

Posted 26 April 2014 - 10:10 AM

Yes, still need help - sorry I've been out of town on business.

 

AdwCleaner log:

 

# AdwCleaner v3.203 - Report created 26/04/2014 at 11:08:16
# Updated 26/04/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (32 bits)
# Username : anausied - ANAUSIED-PC
# Running from : C:\Users\anausied\Downloads\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\Extensions\bopakagnckmlgajfccecajhnimjiiedh
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\bopakagnckmlgajfccecajhnimjiiedh
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{77AA745B-F4F8-45DA-9B14-61D2D95054C8}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{77AA745B-F4F8-45DA-9B14-61D2D95054C8}
Key Deleted : HKCU\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\Software\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\Software\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Deleted : HKLM\Software\{6791A2F3-FC80-475C-A002-C014AF797E9C}
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v11.0.9600.16521
 
 
-\\ Mozilla Firefox v28.0 (en-US)
 
[ File : C:\Users\anausied\AppData\Roaming\Mozilla\Firefox\Profiles\0jy8cas4.default\prefs.js ]
 
 
-\\ Google Chrome v34.0.1847.116
 
[ File : C:\Users\anausied\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
Deleted [Search Provider] : hxxp://search.aol.com/aol/search?query={searchTerms}
Deleted [Search Provider] : hxxp://www.ask.com/web?q={searchTerms}
Deleted [Extension] : bopakagnckmlgajfccecajhnimjiiedh
 
*************************
 
AdwCleaner[R0].txt - [1813 octets] - [26/04/2014 11:06:18]
AdwCleaner[S0].txt - [1756 octets] - [26/04/2014 11:08:16]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1816 octets] ##########


#11 tonyroma

tonyroma
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:11 AM

Posted 26 April 2014 - 10:14 AM

JRT.txt file pasted below:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 7 Home Premium x86
Ran by anausied on Sat 04/26/2014 at 11:11:31.56
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sat 04/26/2014 at 11:13:10.56
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

The computer seems to be running pretty well today.



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 27 April 2014 - 06:27 AM


Hello tonyroma

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 tonyroma

tonyroma
  • Topic Starter

  • Members
  • 13 posts
  • OFFLINE
  •  
  • Local time:11:11 AM

Posted 27 April 2014 - 10:08 PM

Thanks! Here is the combofix log. Computer seems to be running fine for now.

 

ComboFix 14-04-26.01 - anausied 04/27/2014  23:00:04.1.2 - x86
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.3327.2482 [GMT -4:00]
Running from: c:\users\anausied\Desktop\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\sysprep\cryptbase.dll
.
.
(((((((((((((((((((((((((   Files Created from 2014-03-28 to 2014-04-28  )))))))))))))))))))))))))))))))
.
.
2014-04-28 03:06 . 2014-04-28 03:06 -------- d-----w- c:\users\anausied\AppData\Local\temp
2014-04-28 03:06 . 2014-04-28 03:06 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-04-27 09:05 . 2014-04-27 09:05 62576 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{022FF058-FED9-42C9-9820-3CD0912483B3}\offreg.dll
2014-04-26 15:06 . 2010-08-30 12:34 536576 ----a-w- c:\windows\system32\sqlite3.dll
2014-04-26 15:06 . 2014-04-26 15:08 -------- d-----w- C:\AdwCleaner
2014-04-25 19:02 . 2014-04-17 09:32 8050496 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{022FF058-FED9-42C9-9820-3CD0912483B3}\mpengine.dll
2014-04-19 16:56 . 2014-04-20 21:23 -------- d-----w- C:\FRST
2014-04-18 17:34 . 2014-04-18 17:34 -------- d-----w- c:\users\anausied\AppData\Local\CrashDumps
2014-04-18 17:33 . 2014-04-18 17:34 -------- d-----w- c:\users\anausied\AppData\Local\Google
2014-04-18 17:33 . 2014-04-18 17:34 -------- d-----w- c:\program files\Google
2014-04-18 17:33 . 2014-04-18 17:33 -------- d-----w- c:\users\anausied\AppData\Local\Deployment
2014-04-18 17:33 . 2014-04-18 17:33 -------- d-----w- c:\users\anausied\AppData\Local\Apps
2014-04-18 17:21 . 2014-04-18 17:21 -------- d-----w- c:\windows\ERUNT
2014-04-18 07:01 . 2014-04-18 07:01 -------- d-----w- c:\windows\Migration
2014-04-09 13:28 . 2014-02-04 02:07 149440 ----a-w- c:\windows\system32\drivers\storport.sys
2014-04-09 13:28 . 2014-02-04 02:07 234432 ----a-w- c:\windows\system32\drivers\msiscsi.sys
2014-04-09 13:28 . 2014-02-04 02:07 27072 ----a-w- c:\windows\system32\drivers\Diskdump.sys
2014-04-09 13:28 . 2014-02-04 02:00 2048 ----a-w- c:\windows\system32\iologmsg.dll
2014-04-09 13:28 . 2014-01-24 02:18 1212352 ----a-w- c:\windows\system32\drivers\ntfs.sys
2014-04-09 13:27 . 2014-03-31 00:13 2724864 ----a-w- c:\windows\system32\mshtml.tlb
2014-04-06 23:25 . 2014-01-28 02:07 185344 ----a-w- c:\windows\system32\wwansvc.dll
2014-04-06 23:25 . 2014-02-04 02:04 1230336 ----a-w- c:\windows\system32\WindowsCodecs.dll
2014-04-06 23:25 . 2013-12-04 01:54 594944 ----a-w- c:\windows\system32\RMActivate_isv.exe
2014-04-06 23:25 . 2013-12-04 01:54 572416 ----a-w- c:\windows\system32\RMActivate.exe
2014-04-06 23:25 . 2013-12-04 02:03 87040 ----a-w- c:\windows\system32\secproc_ssp_isv.dll
2014-04-06 23:25 . 2013-12-04 02:03 87040 ----a-w- c:\windows\system32\secproc_ssp.dll
2014-04-06 23:25 . 2013-12-04 02:03 423936 ----a-w- c:\windows\system32\secproc_isv.dll
2014-04-06 23:25 . 2013-12-04 02:03 428032 ----a-w- c:\windows\system32\secproc.dll
2014-04-06 23:25 . 2013-12-04 02:02 390144 ----a-w- c:\windows\system32\msdrm.dll
2014-04-06 23:25 . 2013-12-04 01:54 510976 ----a-w- c:\windows\system32\RMActivate_ssp.exe
2014-04-06 23:25 . 2013-12-04 01:54 508928 ----a-w- c:\windows\system32\RMActivate_ssp_isv.exe
2014-04-05 16:33 . 2014-04-20 21:20 107736 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-04-05 16:33 . 2014-04-05 16:33 -------- d-----w- c:\program files\Malwarebytes Anti-Malware
2014-04-05 16:33 . 2014-04-05 16:33 -------- d-----w- c:\programdata\Malwarebytes
2014-04-05 16:33 . 2014-04-03 13:51 51416 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-04-05 16:33 . 2014-04-03 13:51 73432 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-04-05 16:33 . 2014-04-03 13:50 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-04-05 16:33 . 2014-04-05 16:33 -------- d-----w- c:\users\anausied\AppData\Local\Programs
2014-04-05 04:03 . 2014-04-05 04:03 -------- d-----w- c:\users\anausied\AppData\Local\WinZip
2014-04-05 04:03 . 2014-04-05 04:03 -------- d-----w- c:\programdata\WinZip
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-03-31 13:35 . 2013-12-22 20:13 231584 ------w- c:\windows\system32\MpSigStub.exe
2014-03-01 04:10 . 2014-03-15 20:30 4096 ----a-w- c:\windows\system32\ieetwcollectorres.dll
2014-03-01 03:52 . 2014-03-15 20:30 61952 ----a-w- c:\windows\system32\iesetup.dll
2014-03-01 03:51 . 2014-03-15 20:30 51200 ----a-w- c:\windows\system32\ieetwproxystub.dll
2014-03-01 03:38 . 2014-03-15 20:30 112128 ----a-w- c:\windows\system32\ieUnatt.exe
2014-03-01 03:38 . 2014-03-15 20:30 108032 ----a-w- c:\windows\system32\ieetwcollector.exe
2014-03-01 03:37 . 2014-03-15 20:30 553472 ----a-w- c:\windows\system32\jscript9diag.dll
2014-03-01 03:31 . 2014-03-15 20:30 646144 ----a-w- c:\windows\system32\MsSpellCheckingFacility.exe
2014-03-01 03:14 . 2014-03-15 20:30 4244480 ----a-w- c:\windows\system32\jscript9.dll
2014-03-01 03:00 . 2014-03-15 20:30 1964032 ----a-w- c:\windows\system32\inetcpl.cpl
2014-03-01 02:32 . 2014-03-15 20:30 1820160 ----a-w- c:\windows\system32\wininet.dll
2014-02-07 01:07 . 2014-03-15 20:30 2349056 ----a-w- c:\windows\system32\win32k.sys
2014-02-04 02:04 . 2014-03-15 20:30 509440 ----a-w- c:\windows\system32\qedit.dll
2014-01-29 02:06 . 2014-03-15 20:30 381440 ----a-w- c:\windows\system32\wer.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-11-21 959904]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
McAfee Security Scan Plus.lnk - c:\program files\McAfee Security Scan\3.8.141\SSScheduler.exe [2014-1-15 277920]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe [2014-03-01 108032]
R3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\McAfee Security Scan\3.8.141\McCHSvc.exe [2014-01-16 235696]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 52224]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-20 27264]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2013-12-23 1343400]
R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam.sys [2008-05-06 11520]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt86win7.sys [2009-07-13 139776]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-04-18 17:34 1077576 ----a-w- c:\program files\Google\Chrome\Application\34.0.1847.116\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-04-27 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2014-04-18 17:33]
.
2014-04-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2014-04-18 17:33]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
TCP: DhcpNameServer = 75.75.76.76 75.75.75.75
FF - ProfilePath - c:\users\anausied\AppData\Roaming\Mozilla\Firefox\Profiles\0jy8cas4.default\
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2014-04-27  23:07:33
ComboFix-quarantined-files.txt  2014-04-28 03:07
.
Pre-Run: 959,578,320,896 bytes free
Post-Run: 960,190,763,008 bytes free
.
- - End Of File - - 012326E3616262CA61EBFE943B6E5467
A36C5E4F47E84449FF07ED3517B43A31


#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 28 April 2014 - 08:49 AM


Hello tonyroma

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache::


 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:11:11 AM

Posted 01 May 2014 - 05:37 AM


Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users