Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Pop Up Ads - FF and IE


  • This topic is locked This topic is locked
42 replies to this topic

#1 sk8shorty01

sk8shorty01

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 29 April 2014 - 09:38 PM

Hello,

 

Sorry I am unable to give you a specific virus name as I have not been able to find what is causing the issue.

 

I have run two different virus scanners, firewall is activated, and the other steps have been followed to the best of my ability prior to posting here.

 

As I run FireFox (28.0 is what it says the version I am using is) or IE (11.0.9600.17041) I am getting 3-4 pop ups for about every page I visit.  I notice that it does not appear to happen when I visit a search engine (google or bing).  These ads are typically "Flash is out of Date", "Free TV", etc type websites.

 

The log files are attached, I would greatly appreciate any information you all can provide me as I am at a loss as to what to do next.

 

Thank you ver much!

 

 

Mike

Attached Files



BC AdBot (Login to Remove)

 


#2 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 29 April 2014 - 09:41 PM

Sorry I forgot to add that I am using Windows 7.

 

Any other info you would like please let me know.



#3 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:42 PM

Posted 30 April 2014 - 11:23 AM


Hello sk8shorty01

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#4 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 30 April 2014 - 09:19 PM

Hello Gringo!

 

First off, thank you very much for taking the time to help me with my current situation.

 

I followed your directions and have the information provided below.

 

Both FireFox and IE seem to be performing without the Pop Up "Update xxxxx now!" ads as before so it seems to have solved the symptoms although I will let you determine with the text below if the entire problem is all sorted out (as I don't want to just assume it has been).

 

Thanks again!

 

______________

 

# AdwCleaner v3.205 - Report created 30/04/2014 at 21:58:12
# Updated 28/04/2014 by Xplode
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : BauerFamily - BAUERFAMILY-PC
# Running from : C:\Users\BauerFamily\Downloads\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

Service Deleted : MgAssistService
Service Deleted : wStLibG64

***** [ Files / Folders ] *****

Folder Deleted : C:\Program Files (x86)\fbphotozoom
Folder Deleted : C:\Program Files (x86)\Mega Browse
Folder Deleted : C:\Program Files (x86)\Mobogenie
Folder Deleted : C:\Program Files (x86)\Optimizer Pro
Folder Deleted : C:\Users\BauerFamily\.android
Folder Deleted : C:\Users\BauerFamily\AppData\Local\Mobogenie
Folder Deleted : C:\Users\BauerFamily\AppData\Local\PackageAware
Folder Deleted : C:\Users\BAUERF~1\AppData\Local\Temp\AskSearch
Folder Deleted : C:\Users\BAUERF~1\AppData\Local\Temp\Mega Browse
Folder Deleted : C:\Users\BAUERF~1\AppData\Local\Temp\pccustubinstaller
Folder Deleted : C:\Users\BauerFamily\AppData\LocalLow\AskToolbar
Folder Deleted : C:\Users\BauerFamily\AppData\LocalLow\Toolbar4
Folder Deleted : C:\Users\BauerFamily\AppData\Roaming\Systweak
Folder Deleted : C:\Users\BauerFamily\Documents\Mobogenie
Folder Deleted : C:\Users\BauerFamily\Documents\Optimizer Pro
File Deleted : C:\Users\BauerFamily\daemonprocess.txt
File Deleted : C:\Windows\Tasks\FoxTab.job
File Deleted : C:\Windows\System32\Tasks\FoxTab

***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\bopakagnckmlgajfccecajhnimjiiedh
Key Deleted : HKLM\SOFTWARE\Classes\AppID\TbCommonUtils.DLL
Key Deleted : HKLM\SOFTWARE\Classes\AppID\TbHelper.EXE
Key Deleted : HKLM\SOFTWARE\Classes\AppID\WLXQuickTimeShellExt.DLL
Key Deleted : HKLM\SOFTWARE\Classes\ComObject.DeskbarEnabler
Key Deleted : HKLM\SOFTWARE\Classes\ComObject.DeskbarEnabler.1
Key Deleted : HKLM\SOFTWARE\Classes\TbCommonUtils.CommonUtils
Key Deleted : HKLM\SOFTWARE\Classes\TbCommonUtils.CommonUtils.1
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbDownloadManager
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbDownloadManager.1
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbPropertyManager
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbPropertyManager.1
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbRequest
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbRequest.1
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbTask
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.TbTask.1
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.ToolbarHelper
Key Deleted : HKLM\SOFTWARE\Classes\TbHelper.ToolbarHelper.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.ContextMenuNotifier
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.ContextMenuNotifier.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.CustomInternetSecurityImpl
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.CustomInternetSecurityImpl.1
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.SearchProviderManager
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.SearchProviderManager.1
Key Deleted : HKLM\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook
Key Deleted : HKLM\SOFTWARE\Classes\URLSearchHook.ToolbarURLSearchHook.1
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\apnstub_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\askpartnercobrandingtool_rasapi32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\askpartnercobrandingtool_rasmancs
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\AskSLib_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\AskSLib_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MegaBrowse_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MegaBrowse_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\TaskScheduler_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\TaskScheduler_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\updateMegaBrowse_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\updateMegaBrowse_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\utilMegaBrowse_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\utilMegaBrowse_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\Websteroids_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\Websteroids_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\WebsteroidsService_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\WebsteroidsService_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\MobogenieAdd
Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [mobilegeni daemon]
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.TBSB07898
Key Deleted : HKLM\SOFTWARE\Classes\Toolbar3.TBSB07898.1
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{4CE516A7-F7AC-4628-B411-8F886DC5733E}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{5B1881D1-D9C7-46DF-B041-1E593282C7D0}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{628F3201-34D0-49C0-BB9A-82A26AEFB291}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{EA28B360-05E0-4F93-8150-02891F1D8D3C}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1C950DE5-D31E-42FB-AFB9-91B0161633D8}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3BDF4CE9-E81D-432B-A55E-9F0570CE811F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{57CADC46-58FF-4105-B733-5A9F3FC9783C}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9F34B17E-FF0D-4FAB-97C4-9713FEE79052}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A9A56B8E-2DEB-4ED3-BC92-1FA450BCE1A5}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{AE338F6D-5A7C-4D1D-86E3-C618532079B5}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{C339D489-FABC-41DD-B39D-276101667C70}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{CA3EB689-8F09-4026-AA10-B9534C691CE0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D433A9D0-8267-40CB-8AD5-24F22FA5373F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D565B35E-B787-40FA-95E3-E3562F8FC1A0}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D89031C2-10DA-4C90-9A62-FCED012BC46B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{A1CCCE0D-AE21-42A2-BE58-8E6109410995}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{01221FCC-4BFB-461C-B08C-F6D2DF309921}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{452AE416-9A97-44CA-93DA-D0F15C36254F}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{45CDA4F7-594C-49A0-AAD1-8224517FE979}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{81E852CC-1FD5-4004-8761-79A48B975E29}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B2CA345D-ADB8-4F5D-AC64-4AB34322F659}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B9F43021-60D4-42A6-A065-9BA37F38AC47}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BF921DD3-732A-4A11-933B-A5EA49F2FD2C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D83B296A-2FA6-425B-8AE8-A1F33D99FBD6}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4509D3CC-B642-4745-B030-645B79522C6D}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{B87F8B63-7274-43FD-87FA-09D3B7496148}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C4BAE205-5E02-4E32-876E-F34B4E2D000C}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FCBCCB87-9224-4B8D-B117-F56D924BEB18}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{628F3201-34D0-49C0-BB9A-82A26AEFB291}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{01221FCC-4BFB-461C-B08C-F6D2DF309921}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{452AE416-9A97-44CA-93DA-D0F15C36254F}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{45CDA4F7-594C-49A0-AAD1-8224517FE979}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{4897BBA6-48D9-468C-8EFA-846275D7701B}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{81E852CC-1FD5-4004-8761-79A48B975E29}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{B2CA345D-ADB8-4F5D-AC64-4AB34322F659}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{B9F43021-60D4-42A6-A065-9BA37F38AC47}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{BF921DD3-732A-4A11-933B-A5EA49F2FD2C}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{D83B296A-2FA6-425B-8AE8-A1F33D99FBD6}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
Key Deleted : HKCU\Software\Conduit
Key Deleted : HKCU\Software\IM
Key Deleted : HKCU\Software\systweak
Key Deleted : HKCU\Software\AppDataLow\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKCU\Software\AppDataLow\Software\DynConIE
Key Deleted : HKLM\Software\{1146AC44-2F03-4431-B4FD-889BC837521F}
Key Deleted : HKLM\Software\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Deleted : HKLM\Software\{6791A2F3-FC80-475C-A002-C014AF797E9C}
Key Deleted : HKLM\Software\systweak
Key Deleted : HKLM\Software\Uniblue

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.17041


-\\ Mozilla Firefox v28.0 (en-US)

[ File : C:\Users\BauerFamily\AppData\Roaming\Mozilla\Firefox\Profiles\qkinr72y.default-1397443203159\prefs.js ]


-\\ Google Chrome v34.0.1847.131

[ File : C:\Users\BauerFamily\AppData\Local\Google\Chrome\User Data\Default\preferences ]

Deleted [Search Provider] : hxxp://search.aol.com/aol/search?query={searchTerms}
Deleted [Search Provider] : hxxp://www.ask.com/web?q={searchTerms}
Deleted [Search Provider] : hxxp://search.conduit.com/Results.aspx?ctid=CT3324790&octid=EB_ORIGINAL_CTID&SearchSource=58&CUI=&UM=4&UP=SPDAD3375D-A9A4-411D-B8E0-EA453E82B78D&q={searchTerms}&SSPV=
Deleted [Extension] : booedmolknjekdopkepjjeckmjkdpfgl
Deleted [Extension] : bopakagnckmlgajfccecajhnimjiiedh
Deleted [Extension] : flpcjncodpafbgdpnkljologafpionhb

*************************

AdwCleaner[R0].txt - [11932 octets] - [30/04/2014 21:57:22]
AdwCleaner[S0].txt - [10647 octets] - [30/04/2014 21:58:12]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [10708 octets] ##########
 

 

 

 

______________________________________________

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows 7 Home Premium x64
Ran by BauerFamily on Wed 04/30/2014 at 22:07:17.23
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\\Start Page



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\sweetim



~~~ Files



~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\boost_interprocess"
Successfully deleted: [Folder] "C:\ProgramData\starapp"
Successfully deleted: [Folder] "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\uniblue"



~~~ FireFox

Successfully deleted: [Registry Value] HKEY_LOCAL_MACHINE\Software\Mozilla\Firefox\Extensions\\{1c43baf1-00c2-40a8-a09e-f84cfd79546d}
Emptied folder: C:\Users\BauerFamily\AppData\Roaming\mozilla\firefox\profiles\qkinr72y.default-1397443203159\minidumps [3 files]



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 04/30/2014 at 22:11:57.78
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 



#5 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:42 PM

Posted 01 May 2014 - 08:26 AM


Hello sk8shorty01

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#6 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 01 May 2014 - 04:49 PM

Here is the information you requested from ComboFix.

 

The Pop-Ups are still coming up here and there but the frequency has gone down from about 3-4 per site to about 1 every other site or so.

 

 

 

__________________________________________________________

 

 

ComboFix 14-04-30.01 - BauerFamily 05/01/2014  17:40:12.1.4 - x64
Microsoft Windows 7 Home Premium   6.1.7601.1.1252.1.1033.18.8119.6151 [GMT -4:00]
Running from: c:\users\BauerFamily\Downloads\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\BauerFamily\AppData\Local\Microsoft\Windows\Temporary Internet Files\Jotzey_iels
c:\users\BauerFamily\Documents\~WRL3586.tmp
c:\users\BauerFamily\Documents\pub13B.tmp
c:\windows\Downloaded Program Files\IDropPTB.dll
.
.
(((((((((((((((((((((((((   Files Created from 2014-04-01 to 2014-05-01  )))))))))))))))))))))))))))))))
.
.
2014-05-01 21:44 . 2014-05-01 21:44    --------    d-----w-    c:\users\UpdatusUser\AppData\Local\temp
2014-05-01 21:44 . 2014-05-01 21:44    --------    d-----w-    c:\users\Default\AppData\Local\temp
2014-05-01 02:12 . 2014-05-01 02:12    75888    ----a-w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{0BF95035-AA6C-49D9-B3D1-42ECB43504C3}\offreg.dll
2014-05-01 02:11 . 2014-04-16 10:22    10651704    ----a-w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{0BF95035-AA6C-49D9-B3D1-42ECB43504C3}\mpengine.dll
2014-05-01 02:07 . 2014-05-01 02:07    --------    d-----w-    c:\windows\ERUNT
2014-05-01 01:57 . 2010-08-30 12:34    536576    ----a-w-    c:\windows\SysWow64\sqlite3.dll
2014-05-01 01:57 . 2014-05-01 01:58    --------    d-----w-    C:\AdwCleaner
2014-04-30 02:09 . 2014-04-16 10:22    10651704    ----a-w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2014-04-30 01:46 . 2014-04-30 01:46    --------    d-sh--w-    c:\users\BauerFamily\AppData\Local\EmieUserList
2014-04-30 01:46 . 2014-04-30 01:46    --------    d-sh--w-    c:\users\BauerFamily\AppData\Local\EmieSiteList
2014-04-30 01:41 . 2014-04-30 02:13    119512    ----a-w-    c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-04-30 01:41 . 2014-04-30 01:41    --------    d-----w-    c:\program files (x86)\Malwarebytes Anti-Malware
2014-04-30 01:41 . 2014-04-30 01:41    --------    d-----w-    c:\programdata\Malwarebytes
2014-04-30 01:41 . 2014-04-03 13:51    63192    ----a-w-    c:\windows\system32\drivers\mwac.sys
2014-04-30 01:41 . 2014-04-03 13:51    88280    ----a-w-    c:\windows\system32\drivers\mbamchameleon.sys
2014-04-30 01:41 . 2014-04-03 13:50    25816    ----a-w-    c:\windows\system32\drivers\mbam.sys
2014-04-30 01:37 . 2014-04-30 01:37    0    ----a-w-    c:\windows\system32\nvd3dum.dll
2014-04-30 01:24 . 2013-09-02 07:58    175528    ----a-w-    c:\windows\system32\drivers\tmcomm.sys
2014-04-29 07:01 . 2014-03-06 06:00    359936    ----a-w-    c:\program files\Internet Explorer\IEShims.dll
2014-04-29 07:01 . 2014-03-06 05:50    257536    ----a-w-    c:\program files (x86)\Internet Explorer\IEShims.dll
2014-04-29 07:01 . 2014-03-06 08:32    574976    ----a-w-    c:\windows\system32\ieui.dll
2014-04-19 07:33 . 2014-02-20 08:40    1031560    ------w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{50C632F2-C69C-4E5B-AC1E-69BBA51D0A61}\gapaengine.dll
2014-04-09 08:01 . 2014-03-04 09:44    1163264    ----a-w-    c:\windows\system32\kernel32.dll
2014-04-09 08:01 . 2014-03-04 09:44    362496    ----a-w-    c:\windows\system32\wow64win.dll
2014-04-09 08:01 . 2014-03-04 09:44    243712    ----a-w-    c:\windows\system32\wow64.dll
2014-04-09 08:01 . 2014-03-04 09:44    13312    ----a-w-    c:\windows\system32\wow64cpu.dll
2014-04-09 08:01 . 2014-03-04 09:44    16384    ----a-w-    c:\windows\system32\ntvdm64.dll
2014-04-09 08:01 . 2014-03-04 09:17    14336    ----a-w-    c:\windows\SysWow64\ntvdm64.dll
2014-04-09 08:01 . 2014-03-04 09:16    25600    ----a-w-    c:\windows\SysWow64\setup16.exe
2014-04-09 08:01 . 2014-03-04 09:16    5120    ----a-w-    c:\windows\SysWow64\wow32.dll
2014-04-09 08:01 . 2014-03-04 08:09    7680    ----a-w-    c:\windows\SysWow64\instnm.exe
2014-04-09 08:01 . 2014-03-04 08:09    2048    ----a-w-    c:\windows\SysWow64\user.exe
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-04-29 09:13 . 2012-04-02 15:53    692400    ----a-w-    c:\windows\SysWow64\FlashPlayerApp.exe
2014-04-29 09:13 . 2011-05-29 18:35    70832    ----a-w-    c:\windows\SysWow64\FlashPlayerCPLApp.cpl
2014-04-10 07:02 . 2011-08-05 16:27    90655440    ----a-w-    c:\windows\system32\MRT.exe
2014-03-29 05:14 . 2014-03-29 05:14    61120    ----a-w-    c:\windows\system32\drivers\wStLibG64.sys
2014-03-29 02:18 . 2014-03-29 02:18    53248    ----a-r-    c:\users\BauerFamily\AppData\Roaming\Microsoft\Installer\{3EE9BCAE-E9A9-45E5-9B1C-83A4D357E05C}\ARPPRODUCTICON.exe
2014-03-12 17:03 . 2014-03-12 17:03    96168    ----a-w-    c:\windows\SysWow64\WindowsAccessBridge-32.dll
2014-03-11 13:52 . 2011-04-27 19:25    133928    ----a-w-    c:\windows\system32\drivers\NisDrvWFP.sys
2014-03-04 09:17 . 2014-04-09 08:01    44032    ----a-w-    c:\windows\apppatch\acwow64.dll
2014-02-20 08:40 . 2012-06-12 14:42    1031560    ------w-    c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\NISBackup\gapaengine.dll
2014-02-07 01:23 . 2014-03-12 11:22    3156480    ----a-w-    c:\windows\system32\win32k.sys
2014-02-04 02:32 . 2014-03-12 11:22    624128    ----a-w-    c:\windows\system32\qedit.dll
2014-02-04 02:04 . 2014-03-12 11:22    509440    ----a-w-    c:\windows\SysWow64\qedit.dll
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1]
@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    131248    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt.22.dll
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2]
@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    131248    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt.22.dll
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3]
@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    131248    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt.22.dll
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4]
@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    131248    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt.22.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]
"GrooveMonitor"="c:\program files (x86)\Microsoft Office\Office12\GrooveMonitor.exe" [2009-02-26 30040]
"QuickTime Task"="c:\program files (x86)\QuickTime\QTTask.exe" [2010-11-29 421888]
"AdobeCS5.5ServiceManager"="c:\program files (x86)\Common Files\Adobe\CS5.5ServiceManager\CS5.5ServiceManager.exe" [2011-01-12 1523360]
"SwitchBoard"="c:\program files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe" [2010-02-19 517096]
"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2013-09-13 59720]
"AdobeCS5ServiceManager"="c:\program files (x86)\Common Files\Adobe\CS5ServiceManager\CS5ServiceManager.exe" [2010-02-22 406992]
"HP Software Update"="c:\program files (x86)\Hp\HP Software Update\HPWuSchd2.exe" [2010-06-10 49208]
"Adobe ARM"="c:\program files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2013-11-21 959904]
"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2013-09-18 152392]
"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
"LWS"="c:\program files (x86)\Logitech\LWS\Webcam Software\LWS.exe" [2012-09-13 204136]
.
c:\users\BauerFamily\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
Dropbox.lnk - c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\Dropbox.exe /systemstartup [2014-1-2 30714328]
Logitech . Product Registration.lnk - c:\program files (x86)\Logitech\Ereg\eReg.exe /remind /language=ENU /_WFM="." [2009-11-16 517384]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
McAfee Security Scan Plus.lnk - c:\program files\McAfee Security Scan\3.8.141\SSScheduler.exe [2014-1-15 329944]
NETGEAR WN111v2 Smart Wizard.lnk - c:\program files (x86)\NETGEAR\WN111v2\WN111v2.exe [2009-10-10 1728512]
WDDMStatus.lnk - c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMStatus.exe [2010-1-21 2119488]
WDSmartWare.lnk - c:\program files (x86)\Western Digital\WD SmartWare\Front Parlor\WDSmartWare.exe View=show_in_tray [2010-1-21 9136960]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 0 (0x0)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]
"LoadAppInit_DLLs"=1 (0x1)
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\drivers32]
"aux4"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
R1 archlp;archlp;SysWOW64\drivers\archlp.sys;SysWOW64\drivers\archlp.sys [x]
R2 BBSvc;BingBar Service;c:\program files (x86)\Microsoft\BingBar\7.3.132.0\BBSvc.exe;c:\program files (x86)\Microsoft\BingBar\7.3.132.0\BBSvc.exe [x]
R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [x]
R2 mi-raysat_3dsmax2012_64;mental ray 3.9 Satellite for Autodesk 3ds Max 2012 64-bit - English 64-bit;c:\program files\Autodesk\3ds Max 2012\mentalimages\satellite\raysat_3dsmax2012_64server.exe;c:\program files\Autodesk\3ds Max 2012\mentalimages\satellite\raysat_3dsmax2012_64server.exe [x]
R3 BVRPMPR5a64;BVRPMPR5a64 NDIS Protocol Driver;c:\windows\system32\drivers\BVRPMPR5a64.SYS;c:\windows\SYSNATIVE\drivers\BVRPMPR5a64.SYS [x]
R3 FLEXnet Licensing Service 64;FLEXnet Licensing Service 64;c:\program files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe;c:\program files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe [x]
R3 hcwhdpvr;Hauppauge HD PVR Capture Device;c:\windows\system32\DRIVERS\hcwhdpvr.sys;c:\windows\SYSNATIVE\DRIVERS\hcwhdpvr.sys [x]
R3 IEEtwCollectorService;Internet Explorer ETW Collector Service;c:\windows\system32\IEEtwCollector.exe;c:\windows\SYSNATIVE\IEEtwCollector.exe [x]
R3 jswpsapi;Jumpstart Wifi Protected Setup;c:\program files (x86)\NETGEAR\WN111v2\jswpsapi.exe;c:\program files (x86)\NETGEAR\WN111v2\jswpsapi.exe [x]
R3 McComponentHostService;McAfee Security Scan Component Host Service;c:\program files\McAfee Security Scan\3.8.141\McCHSvc.exe;c:\program files\McAfee Security Scan\3.8.141\McCHSvc.exe [x]
R3 netr28x;Ralink 802.11n Wireless Driver for Windows Vista;c:\windows\system32\DRIVERS\netr28x.sys;c:\windows\SYSNATIVE\DRIVERS\netr28x.sys [x]
R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys;c:\windows\SYSNATIVE\DRIVERS\NisDrvWFP.sys [x]
R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe;c:\program files\Microsoft Security Client\NisSrv.exe [x]
R3 PCAMp50a64;PCAMp50a64 NDIS Protocol Driver;c:\windows\system32\Drivers\PCAMp50a64.sys;c:\windows\SYSNATIVE\Drivers\PCAMp50a64.sys [x]
R3 PCASp50a64;PCASp50a64 NDIS Protocol Driver;c:\windows\system32\Drivers\PCASp50a64.sys;c:\windows\SYSNATIVE\Drivers\PCASp50a64.sys [x]
R3 RTTEAMPT;Realtek Teaming Protocol Driver (NDIS 6.0);c:\windows\system32\DRIVERS\RtTeam60.sys;c:\windows\SYSNATIVE\DRIVERS\RtTeam60.sys [x]
R3 RTVLANPT;Realtek Vlan Protocol Driver (NDIS 6.0);c:\windows\system32\DRIVERS\RtVlan60.sys;c:\windows\SYSNATIVE\DRIVERS\RtVlan60.sys [x]
R3 SwitchBoard;Adobe SwitchBoard;c:\program files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe;c:\program files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe [x]
R3 TEAM;Realtek Virtual Miniport Driver for Teaming (NDIS 6.0);c:\windows\system32\DRIVERS\RtTeam60.sys;c:\windows\SYSNATIVE\DRIVERS\RtTeam60.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys;c:\windows\SYSNATIVE\Drivers\usbaapl64.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe;c:\windows\SYSNATIVE\Wat\WatAdminSvc.exe [x]
R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam64.sys;c:\windows\SYSNATIVE\DRIVERS\wdcsam64.sys [x]
R3 WN111v2;NETGEAR WN111v2 USB2.0 Wireless Card Service;c:\windows\system32\DRIVERS\WN111v2w7x.sys;c:\windows\SYSNATIVE\DRIVERS\WN111v2w7x.sys [x]
S0 PxHlpa64;PxHlpa64;c:\windows\System32\Drivers\PxHlpa64.sys;c:\windows\SYSNATIVE\Drivers\PxHlpa64.sys [x]
S1 AsUpIO;AsUpIO;SysWow64\drivers\AsUpIO.sys;SysWow64\drivers\AsUpIO.sys [x]
S1 JSWPSLWF;JumpStart Wireless Filter Driver;c:\windows\system32\DRIVERS\jswpslwfx.sys;c:\windows\SYSNATIVE\DRIVERS\jswpslwfx.sys [x]
S2 mitsijm2013;Autodesk Moldflow Inventor Tool Suite Integration 2013 Job Manager;c:\program files\Autodesk\Inventor 2013\Moldflow\bin\mitsijm.exe;c:\program files\Autodesk\Inventor 2013\Moldflow\bin\mitsijm.exe [x]
S2 RtNdPt60;Realtek NDIS Protocol Driver;c:\windows\system32\DRIVERS\RtNdPt60.sys;c:\windows\SYSNATIVE\DRIVERS\RtNdPt60.sys [x]
S2 WDDMService;WD SmartWare Drive Manager Service;c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe;c:\program files\Western Digital\WD SmartWare\WD Drive Manager\WDDMService.exe [x]
S2 WDSmartWareBackgroundService;WD SmartWare Background Service;c:\program files (x86)\Western Digital\WD SmartWare\Front Parlor\WDSmartWareBackgroundService.exe;c:\program files (x86)\Western Digital\WD SmartWare\Front Parlor\WDSmartWareBackgroundService.exe [x]
S3 BBUpdate;BBUpdate;c:\program files (x86)\Microsoft\BingBar\7.3.132.0\SeaPort.exe;c:\program files (x86)\Microsoft\BingBar\7.3.132.0\SeaPort.exe [x]
S3 CompFilter64;UVCCompositeFilter;c:\windows\system32\DRIVERS\lvbflt64.sys;c:\windows\SYSNATIVE\DRIVERS\lvbflt64.sys [x]
S3 IntcDAud;Intel® Display Audio;c:\windows\system32\DRIVERS\IntcDAud.sys;c:\windows\SYSNATIVE\DRIVERS\IntcDAud.sys [x]
S3 LVRS64;Logitech RightSound Filter Driver;c:\windows\system32\DRIVERS\lvrs64.sys;c:\windows\SYSNATIVE\DRIVERS\lvrs64.sys [x]
S3 LVUVC64;Logitech HD Webcam C525(UVC);c:\windows\system32\DRIVERS\lvuvc64.sys;c:\windows\SYSNATIVE\DRIVERS\lvuvc64.sys [x]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys;c:\windows\SYSNATIVE\DRIVERS\Rt64win7.sys [x]
.
.
[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-04-29 20:09    1078088    ----a-w-    c:\program files (x86)\Google\Chrome\Application\34.0.1847.131\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-05-01 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-02 09:13]
.
2014-05-01 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-05-22 15:31]
.
2014-05-01 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-05-22 15:31]
.
2014-05-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-923005055-327998100-1805643069-1000Core.job
- c:\users\BauerFamily\AppData\Local\Google\Update\GoogleUpdate.exe [2014-03-29 02:31]
.
2014-05-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-923005055-327998100-1805643069-1000UA.job
- c:\users\BauerFamily\AppData\Local\Google\Update\GoogleUpdate.exe [2014-03-29 02:31]
.
.
--------- X64 Entries -----------
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt1]
@="{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314ED9-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    164016    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt2]
@="{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDA-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    164016    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt3]
@="{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDB-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    164016    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\DropboxExt4]
@="{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}"
[HKEY_CLASSES_ROOT\CLSID\{FB314EDC-A251-47B7-93E1-CDD82E34AF8B}]
2013-09-10 23:54    164016    ----a-w-    c:\users\BauerFamily\AppData\Roaming\Dropbox\bin\DropboxExt64.22.dll
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RAVCpl64.exe" [2009-08-18 8067616]
"AdobeAAMUpdater-1.0"="c:\program files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe" [2012-09-20 444904]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-01-11 167704]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-01-11 392984]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-01-11 417560]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2014-03-11 1271072]
"Autodesk Sync"="c:\program files\Autodesk\Autodesk Sync\AdSync.exe" [2012-02-06 415680]
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
uStart Page = hxxp://www.google.com/
mStart Page = hxxp://www.google.com
mLocal Page = c:\windows\SysWOW64\blank.htm
uInternet Settings,ProxyOverride = *.local
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\users\BauerFamily\AppData\Roaming\Mozilla\Firefox\Profiles\qkinr72y.default-1397443203159\
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
Wow6432Node-HKCU-Run-AdobeBridge - (no file)
Wow6432Node-HKCU-Run-RESTART_STICKY_NOTES - c:\windows\System32\StikyNot.exe
Wow6432Node-HKCU-Run-OutfoxTV - c:\program files\OutfoxTV\OutfoxTV\DesktopContainer.exe
Wow6432Node-HKLM-Run-jswtrayutil - c:\program files (x86)\NETGEAR\WN111v2\jswtrayutil.exe
Wow6432Node-HKLM-Run-<NO NAME> - (no file)
HKLM_Wow6432Node-ActiveSetup-{2D46B6DC-2207-486B-B523-A557E6D54B47} - start
Toolbar-Locked - (no file)
AddRemove-{09FF4DB8-7DE9-4D47-B7DB-915DB7D9A8CA} - c:\programdata\{3C0AACBF-B491-4BE5-BAF9-AA46E0629E42}\bm_installer.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_13_0_0_206_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_13_0_0_206_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\CLSID\{BEB3C0C7-B648-4257-96D9-B5D024816E27}\Version*Version]
"Version"=hex:20,2e,4c,f6,1d,23,38,2c,b0,3f,4e,1d,df,8f,44,8e,5f,c3,c1,b4,9c,
   78,f4,2d,ce,21,88,40,a2,59,c0,6c,d8,62,04,66,2b,1f,fb,d9,6b,7e,0b,c8,d7,8f,\
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_13_0_0_206_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_13_0_0_206_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Shockwave Flash Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_13_0_0_206.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]
@="0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]
@="ShockwaveFlash.ShockwaveFlash.13"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_13_0_0_206.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="ShockwaveFlash.ShockwaveFlash"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]
@Denied: (A 2) (Everyone)
@="Macromedia Flash Factory Object"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_13_0_0_206.ocx"
"ThreadingModel"="Apartment"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]
@="FlashFactory.FlashFactory.1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]
@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_13_0_0_206.ocx, 1"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]
@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]
@="1.0"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]
@="FlashFactory.FlashFactory"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\software\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\software\Minnetonka Audio Software\SurCode Dolby Digital Premiere\Version*Version]
"Version"=hex:20,2e,4c,f6,1d,23,38,2c,b0,3f,4e,1d,df,8f,44,8e,5f,c3,c1,b4,9c,
   78,f4,2d,ce,21,88,40,a2,59,c0,6c,d8,62,04,66,2b,1f,fb,d9,6b,7e,0b,c8,d7,8f,\
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2014-05-01  17:46:23
ComboFix-quarantined-files.txt  2014-05-01 21:46
.
Pre-Run: 20,004,200,448 bytes free
Post-Run: 25,557,639,168 bytes free
.
- - End Of File - - C5380EBFA9A56685244C3D7C0F5DB576
F05261C246CE4B3C544521FFFF7AEF5D



#7 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:42 PM

Posted 02 May 2014 - 06:03 AM





Hello sk8shorty01

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit
2.Unzip the contents to a folder in a convenient location.
3.Open the folder where the contents were unzipped and run mbar.exe
4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
6.Wait while the system shuts down and the cleanup process is performed.
7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
  • •Internet access
    •Windows Update
    •Windows Firewall
9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
10.Verify that your system is now functioning normally.


--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from MBAR and Roguekiller and also let me know how the computer is doing at this time.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#8 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 04 May 2014 - 03:14 PM

I am gone for the weekend but I will do this as soon as I can Monday.

I appreciate your help!



#9 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:42 PM

Posted 05 May 2014 - 07:06 AM

No problem and I will look for you then


gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#10 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 07 May 2014 - 10:28 PM

Sorry for the delay but I have now completed what you had me run and the reports will be pasted below.  I have included both of the reports from Rogue Killer because neither had the [2] you had requested.

 

I am noticing now that I am getting a DNS error on certain websites at times and also received the same error while attempting to sign in to my PSN account on a PS3.  I reset my router and modem and still intermittently get the DNS error message.

 

I did run the fix tool within the mbar tool and it says that the fix was complete and it seems like the DNS error is less frequent but still exists.

 

 

 

MBAR:

 

______________

 

 

---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.07.0.1009

© Malwarebytes Corporation 2011-2012

OS version: 6.1.7601 Windows 7 Service Pack 1 x64

Account is Administrative

Internet Explorer version: 11.0.9600.17105

Java version: 1.6.0_31

File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 3.200000 GHz
Memory total: 8513445888, free: 6291623936

Downloaded database version: v2014.05.08.01
Downloaded database version: v2014.03.27.01
Initializing...
======================
------------ Kernel report ------------
     05/07/2014 23:01:50
------------ Loaded modules -----------
\SystemRoot\system32\ntoskrnl.exe
\SystemRoot\system32\hal.dll
\SystemRoot\system32\kdcom.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\CLFS.SYS
\SystemRoot\system32\CI.dll
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\ACPI.sys
\SystemRoot\system32\drivers\WMILIB.SYS
\SystemRoot\system32\drivers\msisadrv.sys
\SystemRoot\system32\drivers\pci.sys
\SystemRoot\system32\drivers\vdrvroot.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\system32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\system32\drivers\pciide.sys
\SystemRoot\system32\drivers\PCIIDEX.SYS
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\system32\drivers\atapi.sys
\SystemRoot\system32\drivers\ataport.SYS
\SystemRoot\system32\drivers\amdxata.sys
\SystemRoot\system32\drivers\fltmgr.sys
\SystemRoot\system32\drivers\fileinfo.sys
\SystemRoot\system32\DRIVERS\MpFilter.sys
\SystemRoot\System32\Drivers\PxHlpa64.sys
\SystemRoot\System32\Drivers\Ntfs.sys
\SystemRoot\System32\Drivers\msrpc.sys
\SystemRoot\System32\Drivers\ksecdd.sys
\SystemRoot\System32\Drivers\cng.sys
\SystemRoot\System32\drivers\pcw.sys
\SystemRoot\System32\Drivers\Fs_Rec.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\Drivers\ksecpkg.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\system32\drivers\volsnap.sys
\SystemRoot\System32\Drivers\spldr.sys
\SystemRoot\System32\drivers\rdyboost.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\System32\drivers\hwpolicy.sys
\SystemRoot\System32\DRIVERS\fvevol.sys
\SystemRoot\system32\DRIVERS\disk.sys
\SystemRoot\system32\DRIVERS\CLASSPNP.SYS
\SystemRoot\system32\DRIVERS\cdrom.sys
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\vga.sys
\SystemRoot\System32\drivers\VIDEOPRT.SYS
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\System32\DRIVERS\RDPCDD.sys
\SystemRoot\system32\drivers\rdpencdd.sys
\SystemRoot\system32\drivers\rdprefmp.sys
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\DRIVERS\wfplwf.sys
\SystemRoot\system32\DRIVERS\pacer.sys
\SystemRoot\system32\DRIVERS\vwififlt.sys
\SystemRoot\system32\DRIVERS\jswpslwfx.sys
\SystemRoot\system32\DRIVERS\netbios.sys
\SystemRoot\system32\DRIVERS\wanarp.sys
\SystemRoot\system32\drivers\termdd.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\system32\drivers\mssmbios.sys
\??\C:\Program Files (x86)\UltraISO\drivers\ISODrv64.sys
\SystemRoot\System32\drivers\discache.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\blbdrive.sys
\SystemRoot\SysWow64\drivers\AsUpIO.sys
\SystemRoot\SysWow64\drivers\AsIO.sys
\SystemRoot\system32\DRIVERS\intelppm.sys
\SystemRoot\system32\DRIVERS\nvlddmkm.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\dxgmms1.sys
\SystemRoot\system32\drivers\usbehci.sys
\SystemRoot\system32\drivers\USBPORT.SYS
\SystemRoot\system32\drivers\HDAudBus.sys
\SystemRoot\system32\DRIVERS\Rt64win7.sys
\SystemRoot\system32\DRIVERS\ASACPI.sys
\SystemRoot\system32\DRIVERS\GEARAspiWDM.sys
\SystemRoot\system32\drivers\CompositeBus.sys
\SystemRoot\system32\DRIVERS\AgileVpn.sys
\SystemRoot\system32\DRIVERS\rasl2tp.sys
\SystemRoot\system32\DRIVERS\ndistapi.sys
\SystemRoot\system32\DRIVERS\ndiswan.sys
\SystemRoot\system32\DRIVERS\raspppoe.sys
\SystemRoot\system32\DRIVERS\raspptp.sys
\SystemRoot\system32\DRIVERS\rassstp.sys
\SystemRoot\system32\DRIVERS\kbdclass.sys
\SystemRoot\system32\DRIVERS\mouclass.sys
\SystemRoot\system32\drivers\swenum.sys
\SystemRoot\system32\drivers\ks.sys
\SystemRoot\system32\drivers\umbus.sys
\SystemRoot\system32\DRIVERS\usbhub.sys
\SystemRoot\System32\Drivers\NDProxy.SYS
\SystemRoot\system32\drivers\RTKVHD64.sys
\SystemRoot\system32\drivers\portcls.sys
\SystemRoot\system32\drivers\drmk.sys
\SystemRoot\system32\drivers\ksthunk.sys
\SystemRoot\system32\DRIVERS\IntcDAud.sys
\SystemRoot\system32\DRIVERS\cdfs.sys
\SystemRoot\system32\DRIVERS\lvbflt64.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\drivers\Dxapi.sys
\SystemRoot\system32\DRIVERS\usbccgp.sys
\SystemRoot\system32\DRIVERS\USBD.SYS
\SystemRoot\system32\drivers\usbaudio.sys
\SystemRoot\system32\DRIVERS\lvrs64.sys
\SystemRoot\system32\DRIVERS\lvuvc64.sys
\SystemRoot\system32\DRIVERS\monitor.sys
\SystemRoot\system32\drivers\hidusb.sys
\SystemRoot\system32\drivers\HIDCLASS.SYS
\SystemRoot\system32\drivers\HIDPARSE.SYS
\SystemRoot\system32\DRIVERS\usbscan.sys
\SystemRoot\system32\DRIVERS\usbprint.sys
\SystemRoot\system32\DRIVERS\mouhid.sys
\SystemRoot\system32\DRIVERS\kbdhid.sys
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\Drivers\dump_dumpata.sys
\SystemRoot\System32\Drivers\dump_atapi.sys
\SystemRoot\System32\Drivers\dump_dumpfve.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\System32\ATMFD.DLL
\SystemRoot\system32\drivers\luafv.sys
\SystemRoot\system32\drivers\WudfPf.sys
\SystemRoot\system32\DRIVERS\lltdio.sys
\SystemRoot\system32\DRIVERS\nwifi.sys
\SystemRoot\system32\DRIVERS\ndisuio.sys
\SystemRoot\system32\DRIVERS\rspndr.sys
\SystemRoot\system32\DRIVERS\RtNdPt60.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\??\C:\Windows\SysWow64\drivers\AsInsHelp64.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\Drivers\secdrv.SYS
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\System32\drivers\tcpipreg.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\DRIVERS\srv.sys
\??\C:\Windows\system32\Drivers\PROCEXP113.SYS
\??\C:\Windows\system32\drivers\mbamchameleon.sys
\??\C:\Windows\system32\drivers\MBAMSwissArmy.sys
\Windows\System32\ntdll.dll
\Windows\System32\smss.exe
\Windows\System32\apisetschema.dll
\Windows\System32\autochk.exe
\Windows\System32\usp10.dll
\Windows\System32\shlwapi.dll
\Windows\System32\rpcrt4.dll
\Windows\System32\psapi.dll
\Windows\System32\ole32.dll
\Windows\System32\wininet.dll
\Windows\System32\nsi.dll
\Windows\System32\normaliz.dll
\Windows\System32\imagehlp.dll
\Windows\System32\sechost.dll
\Windows\System32\shell32.dll
\Windows\System32\Wldap32.dll
\Windows\System32\comdlg32.dll
\Windows\System32\imm32.dll
\Windows\System32\oleaut32.dll
\Windows\System32\lpk.dll
\Windows\System32\gdi32.dll
\Windows\System32\difxapi.dll
\Windows\System32\msvcrt.dll
\Windows\System32\msctf.dll
\Windows\System32\urlmon.dll
\Windows\System32\kernel32.dll
\Windows\System32\clbcatq.dll
\Windows\System32\setupapi.dll
\Windows\System32\ws2_32.dll
\Windows\System32\advapi32.dll
\Windows\System32\user32.dll
\Windows\System32\iertutil.dll
\Windows\System32\devobj.dll
\Windows\System32\api-ms-win-downlevel-version-l1-1-0.dll
\Windows\System32\comctl32.dll
\Windows\System32\api-ms-win-downlevel-shlwapi-l1-1-0.dll
\Windows\System32\wintrust.dll
\Windows\System32\api-ms-win-downlevel-normaliz-l1-1-0.dll
\Windows\System32\api-ms-win-downlevel-advapi32-l1-1-0.dll
\Windows\System32\crypt32.dll
\Windows\System32\KernelBase.dll
\Windows\System32\api-ms-win-downlevel-ole32-l1-1-0.dll
\Windows\System32\cfgmgr32.dll
\Windows\System32\api-ms-win-downlevel-user32-l1-1-0.dll
\Windows\System32\msasn1.dll
\Windows\SysWOW64\normaliz.dll
----------- End -----------
Done!
<<<1>>>
Upper Device Name: \Device\Harddisk0\DR0
Upper Device Object: 0xfffffa8007d56060
Upper Device Driver Name: \Driver\Disk\
Lower Device Name: \Device\Ide\IdeDeviceP0T0L0-0\
Lower Device Object: 0xfffffa8007acf680
Lower Device Driver Name: \Driver\atapi\
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xfffffa8007d56060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xfffffa8007d56b90, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xfffffa8007d56060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
DevicePointer: 0xfffffa8007ac59b0, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xfffffa8007acf680, DeviceName: \Device\Ide\IdeDeviceP0T0L0-0\, DriverName: \Driver\atapi\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Done!
Drive 0
Scanning MBR on drive 0...
Inspecting partition table:
MBR Signature: 55AA
Disk Signature: 67797465

Partition information:

    Partition 0 type is Other (0x1b)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 63  Numsec = 16787862

    Partition 1 type is Primary (0x7)
    Partition is ACTIVE.
    Partition starts at LBA: 16787925  Numsec = 781417665
    Partition is not bootable

    Partition 2 type is Primary (0x7)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 798205590  Numsec = 1155314475

    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0

Disk Size: 1000204886016 bytes
Sector size: 512 bytes

Scanning physical sectors of unpartitioned space on drive 0 (1-62-1953505168-1953525168)...
Done!
Scan finished
=======================================


Removal queue found; removal started
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-0-i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\VBR-0-1-16787925-i.mbam...
Removing C:\ProgramData\Malwarebytes' Anti-Malware (portable)\MBR-0-r.mbam...
Removal finished
 

 

 

 

 

Rogue Killer:

 

________________________________

 

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : BauerFamily [Admin rights]
Mode : Remove -- Date : 05/07/2014 23:19:11
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 4 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED
[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : DisableRegistryTools (0) -> [0x2] The system cannot find the file specified.
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 1 ¤¤¤
[BauerFamily][SUSP PATH] Logitech . Product Registration.lnk : C:\Users\BauerFamily\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Logitech . Product Registration.lnk @C:\PROGRA~2\Logitech\Ereg\eReg.exe /remind /language=ENU /_WFM="." [-][7][-] -> DELETED

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST31000528AS ATA Device +++++
--- User ---
[MBR] f8a1c7376845f294801c625864b8b10d
[BSP] c0bdeeec839b5b23f3cda7ac680a3abe : MBR Code unknown
Partition table:
0 - [XXXXXX] FAT32 (0x1b) [HIDDEN!] Offset (sectors): 63 | Size: 8197 MB
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 16787925 | Size: 381551 MB
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 798205590 | Size: 564118 MB
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_D_05072014_231911.txt >>
RKreport[0]_S_05072014_231853.txt



Rogue Killer Take 2:

 

___________________________

 

 

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : BauerFamily [Admin rights]
Mode : Scan -- Date : 05/07/2014 23:18:53
| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 4 ¤¤¤
[HJ POL][PUM] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ POL][PUM] HKLM\[...]\Wow6432Node\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK][PUM] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Startup Entries : 1 ¤¤¤
[BauerFamily][SUSP PATH] Logitech . Product Registration.lnk : C:\Users\BauerFamily\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Logitech . Product Registration.lnk @C:\PROGRA~2\Logitech\Ereg\eReg.exe /remind /language=ENU /_WFM="." [-][7][-] -> FOUND

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ Browser Addons : 0 ¤¤¤

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤

¤¤¤ External Hives: ¤¤¤

¤¤¤ Infection :  ¤¤¤

¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


127.0.0.1       localhost


¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST31000528AS ATA Device +++++
--- User ---
[MBR] f8a1c7376845f294801c625864b8b10d
[BSP] c0bdeeec839b5b23f3cda7ac680a3abe : MBR Code unknown
Partition table:
0 - [XXXXXX] FAT32 (0x1b) [HIDDEN!] Offset (sectors): 63 | Size: 8197 MB
1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 16787925 | Size: 381551 MB
2 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 798205590 | Size: 564118 MB
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[0]_S_05072014_231853.txt >>



 



#11 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 07 May 2014 - 10:43 PM

I forgot to run Rogue Killer as an admin so I re-ran the software and this is the report I was given below.

 

FYI, this website fails to load with Firefox because of a DNS error but loads fine with Chrome, not sure what the issue is but that is happening frequently now.

 

 

 

 

RogueKiller V8.8.15 _x64_ [Mar 27 2014] by Adlice Software
 
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : BauerFamily [Admin rights]
Mode : Remove -- Date : 05/07/2014 23:41:39
| ARK || FAK || MBR |
 
¤¤¤ Bad processes : 0 ¤¤¤
 
¤¤¤ Registry Entries : 2 ¤¤¤
[HJ DESK][PUM] HKCU\[...]\ClassicStartMenu : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
[HJ DESK][PUM] HKCU\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)
 
¤¤¤ Scheduled tasks : 0 ¤¤¤
 
¤¤¤ Startup Entries : 0 ¤¤¤
 
¤¤¤ Web browsers : 0 ¤¤¤
 
¤¤¤ Browser Addons : 0 ¤¤¤
 
¤¤¤ Particular Files / Folders: ¤¤¤
 
¤¤¤ Driver : [NOT LOADED 0x0] ¤¤¤
[Address] EAT @explorer.exe (AsyncGetClassBits) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5770B0)
[Address] EAT @explorer.exe (AsyncInstallDistributionUnit) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD577210)
[Address] EAT @explorer.exe (BindAsyncMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561F90)
[Address] EAT @explorer.exe (CDLGetLongPathNameA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5778D0)
[Address] EAT @explorer.exe (CDLGetLongPathNameW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5778E8)
[Address] EAT @explorer.exe (CORPolicyProvider) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561674)
[Address] EAT @explorer.exe (CoGetClassObjectFromURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5773FC)
[Address] EAT @explorer.exe (CoInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD577460)
[Address] EAT @explorer.exe (CoInternetCanonicalizeIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD525660)
[Address] EAT @explorer.exe (CoInternetCombineIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5280A0)
[Address] EAT @explorer.exe (CoInternetCombineUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5146A4)
[Address] EAT @explorer.exe (CoInternetCombineUrlEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5143C0)
[Address] EAT @explorer.exe (CoInternetCompareUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD565280)
[Address] EAT @explorer.exe (CoInternetCreateSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E1EE0)
[Address] EAT @explorer.exe (CoInternetCreateZoneManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4F0810)
[Address] EAT @explorer.exe (CoInternetFeatureSettingsChanged) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5A0284)
[Address] EAT @explorer.exe (CoInternetGetProtocolFlags) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD56537C)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5653D0)
[Address] EAT @explorer.exe (CoInternetGetSecurityUrlEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD529CD0)
[Address] EAT @explorer.exe (CoInternetGetSession) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E2460)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD528DC0)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5251B8)
[Address] EAT @explorer.exe (CoInternetIsFeatureEnabledForUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD521820)
[Address] EAT @explorer.exe (CoInternetIsFeatureZoneElevationEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD56586C)
[Address] EAT @explorer.exe (CoInternetParseIUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5156A8)
[Address] EAT @explorer.exe (CoInternetParseUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4F1490)
[Address] EAT @explorer.exe (CoInternetQueryInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD527C50)
[Address] EAT @explorer.exe (CoInternetSetFeatureEnabled) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD565AF4)
[Address] EAT @explorer.exe (CompareSecurityIds) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4FD1A4)
[Address] EAT @explorer.exe (CompatFlagsFromClsid) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD524044)
[Address] EAT @explorer.exe (CopyBindInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD573020)
[Address] EAT @explorer.exe (CopyStgMedium) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4EBA0C)
[Address] EAT @explorer.exe (CreateAsyncBindCtx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5386C0)
[Address] EAT @explorer.exe (CreateAsyncBindCtxEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD523D14)
[Address] EAT @explorer.exe (CreateFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5068E0)
[Address] EAT @explorer.exe (CreateIUriBuilder) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E3660)
[Address] EAT @explorer.exe (CreateURLMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD53CCF4)
[Address] EAT @explorer.exe (CreateURLMonikerEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E78D0)
[Address] EAT @explorer.exe (CreateURLMonikerEx2) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5240F0)
[Address] EAT @explorer.exe (CreateUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E16F0)
[Address] EAT @explorer.exe (CreateUriFromMultiByteString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561EE4)
[Address] EAT @explorer.exe (CreateUriPriv) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561EF8)
[Address] EAT @explorer.exe (CreateUriWithFragment) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561F40)
[Address] EAT @explorer.exe (DllCanUnloadNow) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E1600)
[Address] EAT @explorer.exe (DllGetClassObject) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD52AB3C)
[Address] EAT @explorer.exe (DllInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD562458)
[Address] EAT @explorer.exe (DllRegisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD562464)
[Address] EAT @explorer.exe (DllRegisterServerEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD53E070)
[Address] EAT @explorer.exe (DllUnregisterServer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD562470)
[Address] EAT @explorer.exe (Extract) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD577F74)
[Address] EAT @explorer.exe (FaultInIEFeature) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD578FE8)
[Address] EAT @explorer.exe (FileBearsMarkOfTheWeb) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD516B60)
[Address] EAT @explorer.exe (FindMediaType) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD562E9C)
[Address] EAT @explorer.exe (FindMediaTypeClass) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD506080)
[Address] EAT @explorer.exe (FindMimeFromData) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5250BC)
[Address] EAT @explorer.exe (GetAddSitesFileUrl) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5A02B0)
[Address] EAT @explorer.exe (GetClassFileOrMime) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD53B8EC)
[Address] EAT @explorer.exe (GetClassURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD562074)
[Address] EAT @explorer.exe (GetComponentIDFromCLSSPEC) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5792E8)
[Address] EAT @explorer.exe (GetIDNFlagsForUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4FC7F0)
[Address] EAT @explorer.exe (GetIUriPriv) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561F60)
[Address] EAT @explorer.exe (GetIUriPriv2) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561F50)
[Address] EAT @explorer.exe (GetLabelsFromNamedHost) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5A8B54)
[Address] EAT @explorer.exe (GetMarkOfTheWeb) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD599390)
[Address] EAT @explorer.exe (GetPortFromUrlScheme) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561E94)
[Address] EAT @explorer.exe (GetPropertyFromName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561EA4)
[Address] EAT @explorer.exe (GetPropertyName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561EB4)
[Address] EAT @explorer.exe (GetSoftwareUpdateInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD53E070)
[Address] EAT @explorer.exe (GetUrlmonThreadNotificationHwnd) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD53DEB4)
[Address] EAT @explorer.exe (GetZoneFromAlternateDataStreamEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E6D90)
[Address] EAT @explorer.exe (HlinkGoBack) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD596E78)
[Address] EAT @explorer.exe (HlinkGoForward) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD596F24)
[Address] EAT @explorer.exe (HlinkNavigateMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD596FD0)
[Address] EAT @explorer.exe (HlinkNavigateString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD597004)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD597038)
[Address] EAT @explorer.exe (HlinkSimpleNavigateToString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5975E8)
[Address] EAT @explorer.exe (IECompatLogCSSFix) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5712FC)
[Address] EAT @explorer.exe (IEDllLoader) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5626F0)
[Address] EAT @explorer.exe (IEGetUserPrivateNamespaceName) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD573244)
[Address] EAT @explorer.exe (IEInstallScope) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD577554)
[Address] EAT @explorer.exe (IntlPercentEncodeNormalize) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561F70)
[Address] EAT @explorer.exe (IsAsyncMoniker) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5221FC)
[Address] EAT @explorer.exe (IsDWORDProperty) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561EC4)
[Address] EAT @explorer.exe (IsIntranetAvailable) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5A0668)
[Address] EAT @explorer.exe (IsJITInProgress) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4FB328)
[Address] EAT @explorer.exe (IsLoggingEnabledA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD59855C)
[Address] EAT @explorer.exe (IsLoggingEnabledW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD598688)
[Address] EAT @explorer.exe (IsStringProperty) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD561ED4)
[Address] EAT @explorer.exe (IsValidURL) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD517610)
[Address] EAT @explorer.exe (MkParseDisplayNameEx) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5392F0)
[Address] EAT @explorer.exe (ObtainUserAgentString) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD56DCE0)
[Address] EAT @explorer.exe (PrivateCoInstall) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD577560)
[Address] EAT @explorer.exe (QueryAssociations) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4FE9C0)
[Address] EAT @explorer.exe (QueryClsidAssociation) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD570A8C)
[Address] EAT @explorer.exe (RegisterBindStatusCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD51F600)
[Address] EAT @explorer.exe (RegisterFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD521C6C)
[Address] EAT @explorer.exe (RegisterMediaTypeClass) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5620C0)
[Address] EAT @explorer.exe (RegisterMediaTypes) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD562210)
[Address] EAT @explorer.exe (RegisterWebPlatformPermanentSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD518C54)
[Address] EAT @explorer.exe (ReleaseBindInfo) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4E7D40)
[Address] EAT @explorer.exe (RevokeBindStatusCallback) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD51FBF0)
[Address] EAT @explorer.exe (RevokeFormatEnumerator) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5622CC)
[Address] EAT @explorer.exe (SetAccessForIEAppContainer) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD573258)
[Address] EAT @explorer.exe (SetSoftwareUpdateAdvertisementState) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD53E070)
[Address] EAT @explorer.exe (ShouldDisplayPunycodeForUri) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD56DE50)
[Address] EAT @explorer.exe (ShouldShowIntranetWarningSecband) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD523A3C)
[Address] EAT @explorer.exe (ShowTrustAlertDialog) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5A0820)
[Address] EAT @explorer.exe (URLDownloadA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD565CC4)
[Address] EAT @explorer.exe (URLDownloadToCacheFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD597D9C)
[Address] EAT @explorer.exe (URLDownloadToCacheFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD50A0C4)
[Address] EAT @explorer.exe (URLDownloadToFileA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD597F10)
[Address] EAT @explorer.exe (URLDownloadToFileW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD50EFD0)
[Address] EAT @explorer.exe (URLDownloadW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD565D78)
[Address] EAT @explorer.exe (URLOpenBlockingStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD598058)
[Address] EAT @explorer.exe (URLOpenBlockingStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD598138)
[Address] EAT @explorer.exe (URLOpenPullStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD59821C)
[Address] EAT @explorer.exe (URLOpenPullStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5982E0)
[Address] EAT @explorer.exe (URLOpenStreamA) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD598408)
[Address] EAT @explorer.exe (URLOpenStreamW) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5984D0)
[Address] EAT @explorer.exe (UnregisterWebPlatformPermanentSecurityManager) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD53C9B4)
[Address] EAT @explorer.exe (UrlMkBuildVersion) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD562804)
[Address] EAT @explorer.exe (UrlMkGetSessionOption) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD4F3E60)
[Address] EAT @explorer.exe (UrlMkSetSessionOption) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD51D0E4)
[Address] EAT @explorer.exe (UrlmonCleanupCurrentThread) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD50A27C)
[Address] EAT @explorer.exe (WriteHitLogging) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD5985D0)
[Address] EAT @explorer.exe (ZonesReInit) : imagehlp.dll -> HOOKED (C:\Windows\system32\urlmon.dll @ 0xFD599C30)
 
¤¤¤ External Hives: ¤¤¤
 
¤¤¤ Infection :  ¤¤¤
 
¤¤¤ HOSTS File: ¤¤¤
--> %SystemRoot%\System32\drivers\etc\hosts


#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:42 PM

Posted 08 May 2014 - 11:07 AM


Hello sk8shorty01

I want you to reset firefox back to defaults, this will remove everything from Firefox

I will let you keep your bookmarks so to do that you can go here - Export BookMarks

Now to reset firefox do the following.
  • At the top of the Firefox window, click the "Firefox" button,
  • go over to the "Help" sub-menu
    • (on Windows XP, click the Help menu at the top of the Firefox window) and select "Troubleshooting Information".
  • Click the "Reset Firefox" button in the upper-right corner of the Troubleshooting Information page.
  • click "Reset Firefox" in the confirmation window that opens.
  • Firefox will close and be reset. When it's done. Click "Finish" and Firefox will open.
restart the computer and check firefox for me now

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 08 May 2014 - 04:02 PM

Firefox has now been reset and seems to be working as it was previously.

 

I am unsure why the DNS error also popped up on my PS3 yesterday at the same time although it might just be a coinsciendence.

 

I am still receiving a pop up window to "Update Lightspark Video Player" as I navigate to most websites, not sure if this is legitamite or not so I have just closed the pop up window when it comes about.



#14 sk8shorty01

sk8shorty01
  • Topic Starter

  • Members
  • 24 posts
  • OFFLINE
  •  
  • Local time:09:42 PM

Posted 08 May 2014 - 10:05 PM

So after more time in the browsers the issue with pages not loading still exists.

 

If I use Firefox I cannot get to many pages until I use Chrome to go to the cached version of the page and once I get in that way I can go to the "current page" and that website will then load normally in both browsers.

 

Before I go to the cached version I cannot access most sites through Chrome or Firefox.

 

The DNS issue is also present with logging in on my ps3 to the same network.



#15 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,773 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:09:42 PM

Posted 09 May 2014 - 04:34 AM

Hello sk8shorty01

Lets set the routers DNS to open DNS - https://store.opendns.com/setup/router/


Pick your router and use the settings listed.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users