Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Got hit with Audio ads in background, now netsvcs has filled memory


  • This topic is locked This topic is locked
13 replies to this topic

#1 Rob01

Rob01

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:13 AM

Posted 14 June 2014 - 09:07 PM

Hey

 

I got hit with a problem where something loads up audio ads in the background. I have had this problem before and got rid of it by deleting the svchost.exe that TDDSKILLer found, then I had to reinstall the file and it fixed the problem. This time it is different in that the minute I heard the ads starting to play, I cut off the internet and ran combo fix. It found 2 tmp files and deleted those. The last time I got hit with these audio ads my CPU usage was full now it is the memory that is running about 700 to 800. I tried turning off some of the processes but they come back on after reboot. I have run every kind of anti problem from this site and they find nothing. How do I get all these processes in memory to stop?

 

Thanks for your help.

 

I am running Windows vista



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 15 June 2014 - 02:25 PM




Hello Rob01

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.
.





I would like you to run this program for me.

Please download Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.
  • Double-click to run it. When the tool opens click Yes to disclaimer.
  • Press Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
.





I would also like to get some extra information on one of the files on the computer

Run FRST like you did before and Type the following in the edit box after "Search:".

rpcss.dll

It then should look like:

Search: rpcss.dll

Click Search button and post the log (Search.txt) it makes to your reply.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 Rob01

Rob01
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:13 AM

Posted 15 June 2014 - 03:11 PM

Here is the Farbar reports. It did not make the addition.txt

 

Scan result of Farbar Recovery Scan Tool (FRST) (x86) Version:15-06-2014
Ran by Rob (administrator) on ROB-PC on 15-06-2014 15:02:23
Running from C:\Users\Rob\Desktop
Platform: Microsoft® Windows Vista™ Home Premium  Service Pack 2 (X86) OS Language: English(US)
Internet Explorer Version 9
Boot Mode: Normal

The only official download link for FRST:
Download link for 32-Bit version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/81/
Download link for 64-Bit Version: http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/
Download link from any site other than Bleeping Computer is unpermitted or outdated.
See tutorial for FRST: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(Microsoft Corporation) C:\Windows\System32\SLsvc.exe
(SUPERAntiSpyware.com) C:\Program Files\SUPERAntiSpyware\SASCore.exe
(Apple Inc.) C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe
(Apple Inc.) C:\Program Files\Bonjour\mDNSResponder.exe
(TOSHIBA CORPORATION) C:\Program Files\Toshiba\ConfigFree\CFSvcs.exe
( ) C:\Windows\System32\lxdccoms.exe
() C:\TOSHIBA\IVP\ISM\pinger.exe
() C:\TOSHIBA\IVP\swupdate\swupdtmr.exe
(TOSHIBA Corporation) C:\Windows\System32\TODDSrv.exe
(TOSHIBA Corporation) C:\Program Files\Toshiba\Power Saver\TosCoSrv.exe
(TOSHIBA CORPORATION) C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe
(Intel Corporation) C:\Windows\System32\igfxtray.exe
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Synaptics, Inc.) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
(Realtek Semiconductor) C:\Windows\RtHDVCpl.exe
(TOSHIBA CORPORATION) C:\Program Files\Toshiba\ConfigFree\NDSTray.exe
(TOSHIBA Corporation) C:\Program Files\Toshiba\Power Saver\TPwrMain.exe
(TOSHIBA Corporation) C:\Program Files\Toshiba\SmoothView\SmoothView.exe
(Synaptics, Inc.) C:\Program Files\Synaptics\SynTP\SynToshiba.exe
() C:\Program Files\Lexmark 1300 Series\lxdcamon.exe
(Oracle Corporation) C:\Program Files\Common Files\Java\Java Update\jusched.exe
(Apple Inc.) C:\Program Files\iTunes\iTunesHelper.exe
(TOSHIBA) C:\Program Files\Toshiba\TOSCDSPD\TOSCDSPD.exe
(TOSHIBA CORPORATION) C:\Program Files\Toshiba\ConfigFree\CFSwMgr.exe
(Apple Inc.) C:\Program Files\iPod\bin\iPodService.exe

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [815104 2006-10-27] (Synaptics, Inc.)
HKLM\...\Run: [RtHDVCpl] => C:\Windows\RtHDVCpl.exe [3784704 2006-11-09] (Realtek Semiconductor)
HKLM\...\Run: [LtMoh] => C:\Program Files\ltmoh\Ltmoh.exe
HKLM\...\Run: [NDSTray.exe] => NDSTray.exe
HKLM\...\Run: [HWSetup] => C:\Program Files\TOSHIBA\Utilities\HWSetup.exe [413696 2006-11-01] (TOSHIBA Electronics, Inc.)
HKLM\...\Run: [SVPWUTIL] => C:\Program Files\TOSHIBA\Utilities\SVPWUTIL.exe [421888 2006-01-18] (TOSHIBA)
HKLM\...\Run: [TPwrMain] => C:\Program Files\TOSHIBA\Power Saver\TPwrMain.EXE [411768 2006-12-20] (TOSHIBA Corporation)
HKLM\...\Run: [HSON] => C:\Program Files\TOSHIBA\TBS\HSON.exe [55416 2006-12-07] (TOSHIBA Corporation)
HKLM\...\Run: [SmoothView] => C:\Program Files\Toshiba\SmoothView\SmoothView.exe [448632 2006-12-11] (TOSHIBA Corporation)
HKLM\...\Run: [lxdcmon.exe] => "C:\Program Files\Lexmark 1300 Series\lxdcmon.exe"
HKLM\...\Run: [lxdcamon] => C:\Program Files\Lexmark 1300 Series\lxdcamon.exe [20480 2007-04-30] ()
HKLM\...\Run: [LWS] => C:\Program Files\Logitech\LWS\Webcam Software\LWS.exe [204136 2012-09-13] (Logitech Inc.)
HKLM\...\Run: [SunJavaUpdateSched] => C:\Program Files\Common Files\Java\Java Update\jusched.exe [254336 2013-07-02] (Oracle Corporation)
HKLM\...\Run: [Adobe ARM] => C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe [919008 2012-07-27] (Adobe Systems Incorporated)
HKLM\...\Run: [iTunesHelper] => C:\Program Files\iTunes\iTunesHelper.exe [152392 2014-02-06] (Apple Inc.)
HKU\S-1-5-21-502724121-2098707229-2709770299-1000\...\Run: [TOSCDSPD] => C:\Program Files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe [417792 2006-11-10] (TOSHIBA)
Startup: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Office.lnk
ShortcutTarget: Microsoft Office.lnk -> C:\Program Files\Microsoft Office\Office10\OSA.EXE (Microsoft Corporation)
BootExecute: autocheck autochk * sdnclean.exe

==================== Internet (Whitelisted) ====================

HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
SearchScopes: HKLM - DefaultScope value is missing.
SearchScopes: HKLM - {70F0073D-1292-497D-95A8-31C29847D929} URL = http://www.google.com/search?q={searchTerms}&rls=com.microsoft:{language}&ie={inputEncoding}&oe={outputEncoding}&startIndex={startIndex?}&startPage={startPage};
BHO: Adobe PDF Link Helper - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll (Adobe Systems Incorporated)
BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll (Oracle Corporation)
BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll (Oracle Corporation)
Toolbar: HKCU - &Links - {F2CF5485-4E02-4F68-819C-B92DE9277049} - C:\Windows\system32\ieframe.dll (Microsoft Corporation)
DPF: {02BCC737-B171-4746-94C9-0D8A0B2C0089} http://office.microsoft.com/_layouts/ClientBin/ieawsdc32.cab
DPF: {4B54A9DE-EF1C-4EBE-A328-7C28EA3B433A} http://quickscan.bitdefender.com/qsax/qsax.cab
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} http://download.eset.com/special/eos/OnlineScanner.cab
DPF: {8AD9C840-044E-11D1-B3E9-00805F499D93} http://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
DPF: {CAFEEFAC-FFFF-FFFF-FFFF-ABCDEFFEDCBA} http://java.sun.com/update/1.6.0/jinstall-1_6_0-windows-i586.cab
Handler: ms-itss - {0A9007C0-4076-11D3-8789-0000F8105754} - C:\Program Files\Common Files\Microsoft Shared\Information Retrieval\msitss.dll (Microsoft Corporation)
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\Program Files\Common Files\Skype\Skype4COM.dll (Skype Technologies)
ShellExecuteHooks: SABShellExecuteHook Class - {5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - C:\Program Files\SUPERAntiSpyware\SASSEH.DLL [115440 2013-05-07] (SuperAdBlocker.com)
Winsock: Catalog5 07 C:\Program Files\Bonjour\mdnsNSP.dll [121704] (Apple Inc.)
Hosts: 127.0.0.1 localhost
Tcpip\Parameters: [DhcpNameServer] 24.159.64.23 24.178.162.3 71.9.127.107

FireFox:
========
FF ProfilePath: C:\Users\Rob\AppData\Roaming\Mozilla\Firefox\Profiles\zy73a0e4.default
FF Plugin: @Apple.com/iTunes,version=1.0 - C:\Program Files\iTunes\Mozilla Plugins\npitunes.dll ()
FF Plugin: @java.com/DTPlugin,version=10.55.2 - C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.55.2 - C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll (Oracle Corporation)
FF Plugin: @Microsoft.com/NpCtrl,version=1.0 - c:\Program Files\Microsoft Silverlight\4.1.10111.0\npctrl.dll ( Microsoft Corporation)
FF Plugin: @microsoft.com/WPF,version=3.5 - C:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\NPWPF.dll (Microsoft Corporation)
FF Plugin: Adobe Reader - C:\Program Files\Adobe\Reader 10.0\Reader\AIR\nppdf32.dll (Adobe Systems Inc.)
FF Plugin HKCU: @Google.com/GoogleEarthPlugin - C:\Users\Rob\AppData\Local\Google\Google Earth\plugin\npgeplugin.dll (Google)
FF HKLM\...\Firefox\Extensions: [{20a82645-c095-46ed-80e3-08825760534b}] - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\
FF Extension: Microsoft .NET Framework Assistant - c:\Windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension\ []

========================== Services (Whitelisted) =================

R2 !SASCORE; C:\Program Files\SUPERAntiSpyware\SASCORE.EXE [120088 2013-10-10] (SUPERAntiSpyware.com)
R2 CFSvcs; C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe [40960 2006-11-14] (TOSHIBA CORPORATION) [File not signed]
R3 hpqcxs08; C:\Program Files\HP\Digital Imaging\bin\hpqcxs08.dll [225280 2007-03-13] (Hewlett-Packard Co.) [File not signed]
R2 hpqddsvc; C:\Program Files\HP\Digital Imaging\bin\hpqddsvc.dll [131072 2007-03-13] (Hewlett-Packard Co.) [File not signed]
S3 IDriverT; C:\Program Files\Common Files\InstallShield\Driver\1150\Intel 32\IDriverT.exe [69632 2005-11-14] (Macrovision Corporation) [File not signed]
S2 lxdcCATSCustConnectService; C:\Windows\system32\spool\DRIVERS\W32X86\3\\lxdcserv.exe [99248 2007-05-25] (Lexmark International, Inc.)
R2 lxdc_device; C:\Windows\system32\lxdccoms.exe [537520 2007-05-25] ( )
S2 Net Driver HPZ12; C:\Windows\system32\HPZinw12.dll [43520 2006-11-08] (Hewlett-Packard) [File not signed]
R2 pinger; C:\TOSHIBA\IVP\ISM\pinger.exe [136816 2007-01-25] ()
S2 Pml Driver HPZ12; C:\Windows\system32\HPZipm12.dll [53248 2006-11-08] (Hewlett-Packard) [File not signed]
R2 Swupdtmr; c:\TOSHIBA\IVP\swupdate\swupdtmr.exe [63096 2007-01-25] ()
R2 TODDSrv; C:\Windows\system32\TODDSrv.exe [114688 2006-05-25] (TOSHIBA Corporation) [File not signed]
R2 TOSHIBA Bluetooth Service; C:\Program Files\Toshiba\Bluetooth Toshiba Stack\TosBtSrv.exe [77824 2006-11-01] (TOSHIBA CORPORATION) [File not signed]
S4 SDScannerService; C:\Program Files\Spybot - Search & Destroy 2\SDFSSvc.exe [X]

==================== Drivers (Whitelisted) ====================

S4 KR3NPXP; C:\Windows\system32\drivers\kr3npxp.sys [479488 2006-09-27] (TOSHIBA CORPORATION) [File not signed]
R0 LPCFilter; C:\Windows\System32\DRIVERS\LPCFilter.sys [19456 2006-07-28] (COMPAL ELECTRONIC INC.)
R1 SASDIFSV; C:\Program Files\SUPERAntiSpyware\SASDIFSV.SYS [12880 2011-07-22] (SUPERAdBlocker.com and SUPERAntiSpyware.com)
R1 SASKUTIL; C:\Program Files\SUPERAntiSpyware\SASKUTIL.SYS [67664 2011-07-12] (SUPERAdBlocker.com and SUPERAntiSpyware.com)
U3 TrueSight; C:\Windows\System32\drivers\TrueSight.sys [26624 2014-06-14] () [File not signed]
U5 AppMgmt; C:\Windows\system32\svchost.exe [21504 2008-01-18] (Microsoft Corporation)
S4 blbdrive; \SystemRoot\system32\drivers\blbdrive.sys [X]
S3 IpInIp; system32\DRIVERS\ipinip.sys [X]
S3 NwlnkFlt; system32\DRIVERS\nwlnkflt.sys [X]
S3 NwlnkFwd; system32\DRIVERS\nwlnkfwd.sys [X]
U5 Tosrfusb; C:\Windows\System32\Drivers\Tosrfusb.sys [40960 2006-10-28] (TOSHIBA CORPORATION)
U3 mbr; \??\C:\Users\Rob\AppData\Local\Temp\mbr.sys [X]

==================== NetSvcs (Whitelisted) ===================

==================== One Month Created Files and Folders ========

2014-06-15 15:02 - 2014-06-15 15:02 - 01072640 _____ (Farbar) C:\Users\Rob\Desktop\FRST.exe
2014-06-15 15:02 - 2014-06-15 15:02 - 00010914 _____ () C:\Users\Rob\Desktop\FRST.txt
2014-06-15 14:54 - 2014-06-15 14:54 - 00000000 ____D () C:\Users\Rob\Desktop\FRST-OlderVersion
2014-06-14 20:42 - 2014-06-14 20:42 - 00000000 ____D () C:\Windows\pss
2014-06-14 20:11 - 2014-06-14 20:11 - 00001811 _____ () C:\Users\Rob\Desktop\SUPERAntiSpyware Free Edition.lnk
2014-06-14 20:11 - 2014-06-14 20:11 - 00000000 ____D () C:\Users\Rob\AppData\Roaming\SUPERAntiSpyware.com
2014-06-14 20:11 - 2014-06-14 20:11 - 00000000 ____D () C:\Users\Rob\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SUPERAntiSpyware
2014-06-14 20:10 - 2014-06-14 20:11 - 00000000 ____D () C:\Program Files\SUPERAntiSpyware
2014-06-14 20:10 - 2014-06-14 20:10 - 00000000 ____D () C:\ProgramData\SUPERAntiSpyware.com
2014-06-14 20:01 - 2014-06-14 20:01 - 17292208 _____ (Malwarebytes Corporation ) C:\Users\Rob\Desktop\mbam-setup.exe
2014-06-14 19:57 - 2014-06-14 19:57 - 19673760 _____ (SUPERAntiSpyware) C:\Users\Rob\Desktop\SUPERAntiSpyware.exe
2014-06-14 19:56 - 2014-06-14 19:56 - 01678013 _____ () C:\Users\Rob\Desktop\pc-decrapifier-2.3.1.exe
2014-06-14 19:31 - 2014-06-14 20:25 - 00026624 _____ () C:\Windows\system32\Drivers\TrueSight.sys
2014-06-14 19:31 - 2014-06-14 19:31 - 04686336 _____ () C:\Users\Rob\Desktop\RogueKiller.exe
2014-06-14 19:31 - 2014-06-14 19:31 - 00000000 ____D () C:\ProgramData\RogueKiller
2014-06-14 19:29 - 2014-06-14 19:29 - 01940216 _____ (Bleeping Computer, LLC) C:\Users\Rob\Desktop\rkill.exe
2014-06-14 19:24 - 2014-06-14 19:25 - 04745728 _____ (AVAST Software) C:\Users\Rob\Desktop\aswMBR.exe
2014-06-14 19:09 - 2014-06-14 19:09 - 00002519 _____ () C:\Users\Rob\Desktop\HiJackThis.lnk
2014-06-14 19:09 - 2014-06-14 19:09 - 00000000 ____D () C:\Program Files\Trend Micro
2014-06-14 18:38 - 2014-06-14 18:38 - 00134400 _____ () C:\Windows\Minidump\Mini061414-02.dmp
2014-06-14 18:34 - 2014-06-14 18:34 - 00134400 _____ () C:\Windows\Minidump\Mini061414-01.dmp
2014-06-14 08:04 - 2014-06-14 08:04 - 00000000 ___SD () C:\ComboFix
2014-06-14 08:00 - 2014-06-14 08:00 - 00000640 _____ () C:\Users\Rob\Desktop\JRT.txt
2014-06-14 07:54 - 2014-06-05 20:39 - 04181856 _____ (Kaspersky Lab ZAO) C:\Users\Rob\Desktop\TDSSKiller.exe
2014-06-14 07:12 - 2014-06-14 07:13 - 01333465 _____ () C:\Users\Rob\Desktop\AdwCleaner.exe
2014-06-13 21:09 - 2014-06-13 21:09 - 00000000 ____D () C:\Program Files\ESET
2014-06-13 20:47 - 2014-06-14 06:09 - 00000000 ____D () C:\Users\Rob\AppData\Local\temp(13)
2014-06-13 20:47 - 2014-06-13 20:47 - 00000000 ____D () C:\Users\Public\AppData\Local\temp
2014-06-13 20:47 - 2014-06-13 20:47 - 00000000 ____D () C:\Users\Default\AppData\Local\temp
2014-06-13 20:47 - 2014-06-13 20:47 - 00000000 ____D () C:\Users\Default User\AppData\Local\temp
2014-06-13 20:30 - 2011-06-26 01:45 - 00256000 _____ () C:\Windows\PEV.exe
2014-06-13 20:30 - 2010-11-07 12:20 - 00208896 _____ () C:\Windows\MBR.exe
2014-06-13 20:30 - 2009-04-19 23:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2014-06-13 20:30 - 2000-08-30 19:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2014-06-13 20:30 - 2000-08-30 19:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2014-06-13 20:30 - 2000-08-30 19:00 - 00098816 _____ () C:\Windows\sed.exe
2014-06-13 20:30 - 2000-08-30 19:00 - 00080412 _____ () C:\Windows\grep.exe
2014-06-13 20:30 - 2000-08-30 19:00 - 00068096 _____ () C:\Windows\zip.exe
2014-06-07 20:41 - 2014-06-07 20:41 - 00000000 ____D () C:\Users\Rob\Desktop\Job offer stuff
2014-06-05 20:18 - 2014-06-05 20:59 - 00000000 ____D () C:\Users\Rob\www.catchvideo.net
2014-06-05 20:11 - 2014-06-05 20:58 - 00000000 ____D () C:\Users\Rob\Desktop\Owl City
2014-05-28 20:05 - 2014-05-28 21:24 - 00000000 ____D () C:\Users\Rob\Desktop\Gifted 13-14

==================== One Month Modified Files and Folders =======

2014-06-15 15:02 - 2014-06-15 15:02 - 01072640 _____ (Farbar) C:\Users\Rob\Desktop\FRST.exe
2014-06-15 15:02 - 2014-06-15 15:02 - 00010914 _____ () C:\Users\Rob\Desktop\FRST.txt
2014-06-15 15:02 - 2014-04-20 08:54 - 00000000 ____D () C:\Users\Rob\AppData\Local\temp
2014-06-15 15:02 - 2014-04-19 14:11 - 00000000 ____D () C:\FRST
2014-06-15 14:54 - 2014-06-15 14:54 - 00000000 ____D () C:\Users\Rob\Desktop\FRST-OlderVersion
2014-06-15 14:52 - 2013-03-02 15:45 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-06-15 14:52 - 2006-11-02 07:47 - 00003568 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-1.C7483456-A289-439d-8115-601632D005A0
2014-06-15 14:52 - 2006-11-02 07:47 - 00003568 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-2P-0.C7483456-A289-439d-8115-601632D005A0
2014-06-14 20:44 - 2006-11-02 05:33 - 00755222 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-06-14 20:42 - 2014-06-14 20:42 - 00000000 ____D () C:\Windows\pss
2014-06-14 20:42 - 2011-08-14 00:48 - 01122436 _____ () C:\Windows\WindowsUpdate.log
2014-06-14 20:39 - 2007-05-22 17:58 - 00615236 _____ () C:\Windows\PFRO.log
2014-06-14 20:39 - 2006-11-02 08:01 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-06-14 20:38 - 2014-04-19 11:13 - 00000000 ____D () C:\AdwCleaner
2014-06-14 20:31 - 2014-04-14 20:50 - 00110296 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-06-14 20:30 - 2014-04-14 20:49 - 00000910 _____ () C:\Users\Public\Desktop\Malwarebytes Anti-Malware.lnk
2014-06-14 20:30 - 2014-04-14 20:49 - 00000000 ____D () C:\Program Files\Malwarebytes Anti-Malware
2014-06-14 20:25 - 2014-06-14 19:31 - 00026624 _____ () C:\Windows\system32\Drivers\TrueSight.sys
2014-06-14 20:11 - 2014-06-14 20:11 - 00001811 _____ () C:\Users\Rob\Desktop\SUPERAntiSpyware Free Edition.lnk
2014-06-14 20:11 - 2014-06-14 20:11 - 00000000 ____D () C:\Users\Rob\AppData\Roaming\SUPERAntiSpyware.com
2014-06-14 20:11 - 2014-06-14 20:11 - 00000000 ____D () C:\Users\Rob\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\SUPERAntiSpyware
2014-06-14 20:11 - 2014-06-14 20:10 - 00000000 ____D () C:\Program Files\SUPERAntiSpyware
2014-06-14 20:10 - 2014-06-14 20:10 - 00000000 ____D () C:\ProgramData\SUPERAntiSpyware.com
2014-06-14 20:02 - 2006-11-02 08:01 - 00032652 _____ () C:\Windows\Tasks\SCHEDLGU.TXT
2014-06-14 20:01 - 2014-06-14 20:01 - 17292208 _____ (Malwarebytes Corporation ) C:\Users\Rob\Desktop\mbam-setup.exe
2014-06-14 19:57 - 2014-06-14 19:57 - 19673760 _____ (SUPERAntiSpyware) C:\Users\Rob\Desktop\SUPERAntiSpyware.exe
2014-06-14 19:56 - 2014-06-14 19:56 - 01678013 _____ () C:\Users\Rob\Desktop\pc-decrapifier-2.3.1.exe
2014-06-14 19:31 - 2014-06-14 19:31 - 04686336 _____ () C:\Users\Rob\Desktop\RogueKiller.exe
2014-06-14 19:31 - 2014-06-14 19:31 - 00000000 ____D () C:\ProgramData\RogueKiller
2014-06-14 19:29 - 2014-06-14 19:29 - 01940216 _____ (Bleeping Computer, LLC) C:\Users\Rob\Desktop\rkill.exe
2014-06-14 19:25 - 2014-06-14 19:24 - 04745728 _____ (AVAST Software) C:\Users\Rob\Desktop\aswMBR.exe
2014-06-14 19:09 - 2014-06-14 19:09 - 00002519 _____ () C:\Users\Rob\Desktop\HiJackThis.lnk
2014-06-14 19:09 - 2014-06-14 19:09 - 00000000 ____D () C:\Program Files\Trend Micro
2014-06-14 19:09 - 2011-12-21 12:14 - 00000000 ____D () C:\Users\Rob\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\HiJackThis
2014-06-14 18:38 - 2014-06-14 18:38 - 00134400 _____ () C:\Windows\Minidump\Mini061414-02.dmp
2014-06-14 18:38 - 2013-11-21 00:31 - 128036089 _____ () C:\Windows\MEMORY.DMP
2014-06-14 18:38 - 2013-11-21 00:31 - 00000000 ____D () C:\Windows\Minidump
2014-06-14 18:34 - 2014-06-14 18:34 - 00134400 _____ () C:\Windows\Minidump\Mini061414-01.dmp
2014-06-14 09:15 - 2013-03-17 16:24 - 00000000 ____D () C:\Users\Rob\AppData\Local\com.zipeg
2014-06-14 09:15 - 2006-11-02 06:18 - 00000000 ____D () C:\Windows\system32\spool
2014-06-14 09:15 - 2006-11-02 06:18 - 00000000 ____D () C:\Windows\system32\Msdtc
2014-06-14 09:15 - 2006-11-02 06:18 - 00000000 ____D () C:\Windows\registration
2014-06-14 09:15 - 2006-11-02 05:22 - 38797312 _____ () C:\Windows\system32\config\software_previous
2014-06-14 09:15 - 2006-11-02 05:22 - 17563648 _____ () C:\Windows\system32\config\system_previous
2014-06-14 09:12 - 2006-11-02 05:22 - 36962304 _____ () C:\Windows\system32\config\components_previous
2014-06-14 09:12 - 2006-11-02 05:22 - 00262144 _____ () C:\Windows\system32\config\sam_previous
2014-06-14 08:04 - 2014-06-14 08:04 - 00000000 ___SD () C:\ComboFix
2014-06-14 08:03 - 2014-04-19 12:04 - 00000000 ____D () C:\Qoobox
2014-06-14 08:00 - 2014-06-14 08:00 - 00000640 _____ () C:\Users\Rob\Desktop\JRT.txt
2014-06-14 07:13 - 2014-06-14 07:12 - 01333465 _____ () C:\Users\Rob\Desktop\AdwCleaner.exe
2014-06-14 06:35 - 2014-04-20 08:29 - 00000000 ____D () C:\Windows\erdnt
2014-06-14 06:18 - 2011-08-14 06:09 - 00000000 ____D () C:\Users\Rob
2014-06-14 06:10 - 2006-11-02 05:22 - 00262144 _____ () C:\Windows\system32\config\security_previous
2014-06-14 06:10 - 2006-11-02 05:22 - 00262144 _____ () C:\Windows\system32\config\default_previous
2014-06-14 06:09 - 2014-06-13 20:47 - 00000000 ____D () C:\Users\Rob\AppData\Local\temp(13)
2014-06-13 21:09 - 2014-06-13 21:09 - 00000000 ____D () C:\Program Files\ESET
2014-06-13 21:04 - 2014-04-19 22:12 - 00000000 ____D () C:\TDSSKiller_Quarantine
2014-06-13 20:47 - 2014-06-13 20:47 - 00000000 ____D () C:\Users\Public\AppData\Local\temp
2014-06-13 20:47 - 2014-06-13 20:47 - 00000000 ____D () C:\Users\Default\AppData\Local\temp
2014-06-13 20:47 - 2014-06-13 20:47 - 00000000 ____D () C:\Users\Default User\AppData\Local\temp
2014-06-10 11:06 - 2011-09-08 06:27 - 00000000 ____D () C:\Program Files\Lx_cats
2014-06-10 11:05 - 2011-11-22 07:40 - 00018684 _____ () C:\ProgramData\lxdc
2014-06-09 07:27 - 2012-06-26 05:50 - 00000000 ____D () C:\Users\Rob\Desktop\Cinnamon Roll Recipe
2014-06-09 07:13 - 2011-11-03 09:58 - 00001798 _____ () C:\Users\Rob\AppData\Roaming\wklnhst.dat
2014-06-07 20:41 - 2014-06-07 20:41 - 00000000 ____D () C:\Users\Rob\Desktop\Job offer stuff
2014-06-05 20:59 - 2014-06-05 20:18 - 00000000 ____D () C:\Users\Rob\www.catchvideo.net
2014-06-05 20:58 - 2014-06-05 20:11 - 00000000 ____D () C:\Users\Rob\Desktop\Owl City
2014-06-05 20:39 - 2014-06-14 07:54 - 04181856 _____ (Kaspersky Lab ZAO) C:\Users\Rob\Desktop\TDSSKiller.exe
2014-06-04 15:48 - 2011-09-12 22:38 - 00000000 ____D () C:\Users\Rob\AppData\Local\CutePDF Writer
2014-06-04 15:28 - 2011-08-14 12:23 - 00000000 ____D () C:\Users\Rob\Documents\My PSP Files
2014-06-02 06:06 - 2011-11-07 07:01 - 00000000 ____D () C:\Users\Rob\Desktop\UA paperwork
2014-05-28 21:24 - 2014-05-28 20:05 - 00000000 ____D () C:\Users\Rob\Desktop\Gifted 13-14
2014-05-18 18:28 - 2011-11-29 21:53 - 00000680 _____ () C:\Users\Rob\AppData\Local\d3d9caps.dat

Some content of TEMP:
====================
C:\Users\Rob\AppData\Local\temp\jre-7u55-windows-i586-iftw.exe
C:\Users\Rob\AppData\Local\temp\Quarantine.exe

==================== Bamital & volsnap Check =================

C:\Windows\explorer.exe => File is digitally signed
C:\Windows\system32\winlogon.exe => File is digitally signed
C:\Windows\system32\wininit.exe => File is digitally signed
C:\Windows\system32\svchost.exe => File is digitally signed
C:\Windows\system32\services.exe => File is digitally signed
C:\Windows\system32\User32.dll => File is digitally signed
C:\Windows\system32\userinit.exe => File is digitally signed
C:\Windows\system32\rpcss.dll => File is digitally signed
C:\Windows\system32\Drivers\volsnap.sys => File is digitally signed

LastRegBack: 2014-06-14 20:46

==================== End Of Log ============================

 

 

 

 

 

 

Farbar Recovery Scan Tool (x86) Version:15-06-2014
Ran by Rob at 2014-06-15 15:03:34
Running from C:\Users\Rob\Desktop
Boot Mode: Normal

================== Search: "rpcss.dll" ===================

C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6002.18005_none_6bb655083b01c988\rpcss.dll
[2011-09-06 10:09][2009-04-10 23:28] 0550400 ____A (Microsoft Corporation) 3B5B4D53FEC14F7476CA29A20CC31AC9 [File is signed]

C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6001.22389_none_6a06ffcd57365beb\rpcss.dll
[2011-08-30 23:32][2011-08-30 23:32] 0551424 ____A (Microsoft Corporation) 4DFCBDEF3CCAA98F99038DED78945253 [File is signed]

C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6001.18226_none_69bb41ac3deac876\rpcss.dll
[2011-08-30 23:32][2011-08-30 23:32] 0551424 ____A (Microsoft Corporation) 301AE00E12408650BADDC04DBC832830 [File is signed]

C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6001.18000_none_69cadbfc3ddffe3c\rpcss.dll
[2011-09-06 08:27][2008-01-18 23:36] 0547328 ____A (Microsoft Corporation) 33FB1F0193EE2051067441492D56113C [File is signed]

C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6000.21023_none_685b771559e4be8c\rpcss.dll
[2011-08-30 23:32][2011-08-30 23:32] 0550400 ____A (Microsoft Corporation) B1BB45E24717A7F790B4411C4446EF5E [File is signed]

C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6000.16830_none_67c4315e40d1bb6c\rpcss.dll
[2011-08-30 23:32][2011-08-30 23:32] 0549888 ____A (Microsoft Corporation) 7B981222A257D076885BFFB66F19B7CE [File is signed]

C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.0.6000.16386_none_67941a0040f4ed68\rpcss.dll
[2006-11-02 03:50][2006-11-02 04:46] 0545792 ____A (Microsoft Corporation) B46D8EA6DD30BAA49F674DACDC4C491F [File is signed]

C:\Windows\System32\rpcss.dll
[2011-09-06 10:09][2009-04-10 23:28] 0550400 ____A (Microsoft Corporation) 3B5B4D53FEC14F7476CA29A20CC31AC9 [File is signed]

C:\Windows\erdnt\cache\rpcss.dll
[2014-04-20 08:53][2009-04-10 23:28] 0550400 ____A (Microsoft Corporation) 3B5B4D53FEC14F7476CA29A20CC31AC9 [File is signed]

=== End Of Search



#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 16 June 2014 - 03:27 AM



Hello Rob01

These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 Rob01

Rob01
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:13 AM

Posted 16 June 2014 - 05:55 AM

Here is the adwcleaner and Junkware reports. I still have the same problem where the memory is running about 500 to 900 depending on what I do. There are 61 processes running, most are stopped. I have never seen that many in the taskmanger at once. The CPU is running ok. I also noticed that I have 2 volume mixers. The same thing happened last time when I got hit with audio ads. It went to 1 mixer once I cleaned the problem. 

 

 

# AdwCleaner v3.212 - Report created 16/06/2014 at 05:34:39
# Updated 05/06/2014 by Xplode
# Operating System : Windows Vista ™ Home Premium Service Pack 2 (32 bits)
# Username : Rob - ROB-PC
# Running from : C:\Users\Rob\Desktop\AdwCleaner.exe
# Option : Clean

***** [ Services ] *****

***** [ Files / Folders ] *****

***** [ Shortcuts ] *****

***** [ Registry ] *****

***** [ Browsers ] *****

-\\ Internet Explorer v9.0.8112.16421

-\\ Mozilla Firefox v29.0.1 (en-US)

[ File : C:\Users\Rob\AppData\Roaming\Mozilla\Firefox\Profiles\zy73a0e4.default\prefs.js ]

*************************

AdwCleaner[R0].txt - [4222 octets] - [19/04/2014 11:13:40]
AdwCleaner[R1].txt - [893 octets] - [14/06/2014 20:36:54]
AdwCleaner[R2].txt - [1011 octets] - [16/06/2014 05:26:54]
AdwCleaner[S0].txt - [2447 octets] - [19/04/2014 11:21:50]
AdwCleaner[S1].txt - [953 octets] - [14/06/2014 20:38:29]
AdwCleaner[S2].txt - [934 octets] - [16/06/2014 05:34:39]

########## EOF - C:\AdwCleaner\AdwCleaner[S2].txt - [993 octets] ##########

 

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.4 (04.06.2014:1)
OS: Windows Vista ™ Home Premium x86
Ran by Rob on Mon 06/16/2014 at  5:38:46.35
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

~~~ Services

 

~~~ Registry Values

 

~~~ Registry Keys

 

~~~ Files

 

~~~ Folders

 

~~~ Event Viewer Logs were cleared

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 06/16/2014 at  5:41:47.57
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 16 June 2014 - 12:22 PM


Hello Rob01

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 Rob01

Rob01
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:13 AM

Posted 16 June 2014 - 01:50 PM

Here is combo fix log. Memory still seems to be running high but compared to other computers I have looked at, this might be normal. Everything seems to be running fine. Is there a way to check to see if any back doors are open on this machine?

 

 

 

ComboFix 14-06-16.01 - Rob 06/16/2014  13:27:02.2.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.1013.404 [GMT -5:00]
Running from: c:\users\Rob\Desktop\ComboFix.exe
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2014-05-16 to 2014-06-16  )))))))))))))))))))))))))))))))
.
.
2014-06-16 18:34 . 2014-06-16 18:35 -------- d-----w- c:\users\Rob\AppData\Local\temp
2014-06-16 18:34 . 2014-06-16 18:34 -------- d-----w- c:\users\Public\AppData\Local\temp
2014-06-16 18:34 . 2014-06-16 18:34 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-06-15 01:11 . 2014-06-15 01:11 -------- d-----w- c:\users\Rob\AppData\Roaming\SUPERAntiSpyware.com
2014-06-15 01:10 . 2014-06-15 01:11 -------- d-----w- c:\program files\SUPERAntiSpyware
2014-06-15 01:10 . 2014-06-15 01:10 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2014-06-15 00:31 . 2014-06-15 01:25 26624 ----a-w- c:\windows\system32\drivers\TrueSight.sys
2014-06-15 00:31 . 2014-06-15 00:31 -------- d-----w- c:\programdata\RogueKiller
2014-06-15 00:09 . 2014-06-15 00:09 388096 ----a-r- c:\users\Rob\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2014-06-15 00:09 . 2014-06-15 00:09 -------- d-----w- c:\program files\Trend Micro
2014-06-14 02:09 . 2014-06-14 02:09 -------- d-----w- c:\program files\ESET
2014-06-06 01:18 . 2014-06-06 01:59 -------- d-----w- c:\users\Rob\www.catchvideo.net
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-06-16 11:05 . 2014-04-15 01:50 110296 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-05-14 10:10 . 2012-04-15 17:47 692400 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-05-14 10:10 . 2011-08-14 12:55 70832 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-05-12 12:35 . 2014-04-15 01:49 51928 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-05-12 12:35 . 2014-04-15 01:49 74456 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-05-12 12:35 . 2014-04-15 01:49 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-04-17 10:32 . 2014-04-20 12:05 8050496 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{A7CFEBC1-281D-41C1-8797-545DFB6934BC}\mpengine.dll
2014-04-15 01:13 . 2014-05-10 00:57 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2014-03-31 14:35 . 2011-08-31 04:26 231584 ------w- c:\windows\system32\MpSigStub.exe
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2006-11-10 417792]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2006-11-29 98304]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2006-11-29 106496]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-10-27 815104]
"RtHDVCpl"="RtHDVCpl.exe" [2006-11-09 3784704]
"LtMoh"="c:\program files\ltmoh\Ltmoh.exe" [BU]
"NDSTray.exe"="NDSTray.exe" [BU]
"HWSetup"="c:\program files\TOSHIBA\Utilities\HWSetup.exe" [2006-11-01 413696]
"SVPWUTIL"="c:\program files\TOSHIBA\Utilities\SVPWUTIL.exe" [2006-01-18 421888]
"lxdcmon.exe"="c:\program files\Lexmark 1300 Series\lxdcmon.exe" [BU]
"lxdcamon"="c:\program files\Lexmark 1300 Series\lxdcamon.exe" [2007-04-30 20480]
"LWS"="c:\program files\Logitech\LWS\Webcam Software\LWS.exe" [2012-09-13 204136]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2014-02-06 152392]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE -b -l [2001-2-13 83360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2013-05-07 115440]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ    autocheck autochk *\0\0sdnclean.exe
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]
2014-02-06 06:52 43848 ----a-w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CanonMyPrinter]
2009-11-02 01:30 2508104 ----a-w- c:\program files\Canon\MyPrinter\BJMYPRT.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2011-07-05 23:36 421888 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SUPERAntiSpyware]
2014-06-05 21:16 5626136 ----a-w- c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [2013-10-10 120088]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
HPZ12 REG_MULTI_SZ    Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ    hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder
.
2014-06-16 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-15 10:10]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000
TCP: DhcpNameServer = 24.159.64.23 24.178.162.3 71.9.127.107
FF - ProfilePath - c:\users\Rob\AppData\Roaming\Mozilla\Firefox\Profiles\zy73a0e4.default\
.
- - - - ORPHANS REMOVED - - - -
.
SafeBoot-73418532.sys
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-06-16 13:35
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
  TOSCDSPD = c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe?/i?????Z#6_??????U?8?U?p?U???U???
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ogg\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pcm\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pls\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.spx\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\S-1-5-21-502724121-2098707229-2709770299-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{9FD6924F-721E-DFC7-B229-056F8B8FD109}*]
@Allowed: (Read) (RestrictedCode)
"oaobmkajpaffjapongckmnjgokiopg"=hex:61,69,6d,6b,70,6b,67,6d,61,6d,64,68,62,61,
   61,6b,6b,66,65,62,67,6b,6b,62,66,68,69,70,64,70,69,61,6a,63,6c,64,69,6d,6c,\
"iadbkheeiphjeblald"=hex:6a,61,68,6f,70,68,65,6b,61,6a,68,6a,6b,64,67,63,63,66,
   63,6f,00,03
"hajbmicdjhedejpo"=hex:6a,61,68,6f,70,68,65,6b,61,6a,68,6a,6b,64,67,63,63,66,
   63,6f,00,02
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
Completion time: 2014-06-16  13:39:43
ComboFix-quarantined-files.txt  2014-06-16 18:39
ComboFix2.txt  2014-06-14 01:47
ComboFix3.txt  2014-04-20 02:55
ComboFix4.txt  2014-04-19 18:52
.
Pre-Run: 30,630,535,168 bytes free
Post-Run: 30,807,498,752 bytes free
.
- - End Of File - - A34076404334251D458AD3CA36C2D48B
5B5E648D12FCADC244C1EC30318E1EB9
 



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 16 June 2014 - 08:25 PM


Hello Rob01

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache::


 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 Rob01

Rob01
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:13 AM

Posted 16 June 2014 - 09:07 PM

Here is the script log from combofix. No problems running that. I dont think there is any difference. I do notice that the memory is running about 68 to 70 % and the svchost.exe file is running a lot of stuff. I have never see all this stuff in this window before. Way to much going on. Processes 52, CPU usage 4%, Physical Memory 76%. The memory has been running around 400-500 but its up today 700 for some reason.

 

 

 

ComboFix 14-06-16.01 - Rob 06/16/2014  20:38:38.3.2 - x86
Microsoft® Windows Vista™ Home Premium   6.0.6002.2.1252.1.1033.18.1013.398 [GMT -5:00]
Running from: c:\users\Rob\Desktop\ComboFix.exe
Command switches used :: c:\users\Rob\Desktop\CFScript.txt
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2014-05-17 to 2014-06-17  )))))))))))))))))))))))))))))))
.
.
2014-06-17 01:47 . 2014-06-17 01:48 -------- d-----w- c:\users\Rob\AppData\Local\temp
2014-06-17 01:47 . 2014-06-17 01:47 -------- d-----w- c:\users\Public\AppData\Local\temp
2014-06-17 01:47 . 2014-06-17 01:47 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-06-15 01:11 . 2014-06-15 01:11 -------- d-----w- c:\users\Rob\AppData\Roaming\SUPERAntiSpyware.com
2014-06-15 01:10 . 2014-06-15 01:11 -------- d-----w- c:\program files\SUPERAntiSpyware
2014-06-15 01:10 . 2014-06-15 01:10 -------- d-----w- c:\programdata\SUPERAntiSpyware.com
2014-06-15 00:31 . 2014-06-15 01:25 26624 ----a-w- c:\windows\system32\drivers\TrueSight.sys
2014-06-15 00:31 . 2014-06-15 00:31 -------- d-----w- c:\programdata\RogueKiller
2014-06-15 00:09 . 2014-06-15 00:09 388096 ----a-r- c:\users\Rob\AppData\Roaming\Microsoft\Installer\{45A66726-69BC-466B-A7A4-12FCBA4883D7}\HiJackThis.exe
2014-06-15 00:09 . 2014-06-15 00:09 -------- d-----w- c:\program files\Trend Micro
2014-06-14 02:09 . 2014-06-14 02:09 -------- d-----w- c:\program files\ESET
2014-06-06 01:18 . 2014-06-06 01:59 -------- d-----w- c:\users\Rob\www.catchvideo.net
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-06-16 11:05 . 2014-04-15 01:50 110296 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-05-14 10:10 . 2012-04-15 17:47 692400 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-05-14 10:10 . 2011-08-14 12:55 70832 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-05-12 12:35 . 2014-04-15 01:49 51928 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-05-12 12:35 . 2014-04-15 01:49 74456 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-05-12 12:35 . 2014-04-15 01:49 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-04-17 10:32 . 2014-04-20 12:05 8050496 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{A7CFEBC1-281D-41C1-8797-545DFB6934BC}\mpengine.dll
2014-04-15 01:13 . 2014-05-10 00:57 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2014-03-31 14:35 . 2011-08-31 04:26 231584 ------w- c:\windows\system32\MpSigStub.exe
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TOSCDSPD"="c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe" [2006-11-10 417792]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2006-11-29 98304]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2006-11-29 106496]
"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2006-10-27 815104]
"RtHDVCpl"="RtHDVCpl.exe" [2006-11-09 3784704]
"LtMoh"="c:\program files\ltmoh\Ltmoh.exe" [BU]
"NDSTray.exe"="NDSTray.exe" [BU]
"HWSetup"="c:\program files\TOSHIBA\Utilities\HWSetup.exe" [2006-11-01 413696]
"SVPWUTIL"="c:\program files\TOSHIBA\Utilities\SVPWUTIL.exe" [2006-01-18 421888]
"lxdcmon.exe"="c:\program files\Lexmark 1300 Series\lxdcmon.exe" [BU]
"lxdcamon"="c:\program files\Lexmark 1300 Series\lxdcamon.exe" [2007-04-30 20480]
"LWS"="c:\program files\Logitech\LWS\Webcam Software\LWS.exe" [2012-09-13 204136]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-07-27 919008]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2014-02-06 152392]
.
c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\
Microsoft Office.lnk - c:\program files\Microsoft Office\Office10\OSA.EXE -b -l [2001-2-13 83360]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[hkey_local_machine\software\microsoft\windows\currentversion\explorer\ShellExecuteHooks]
"{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA}"= "c:\program files\SUPERAntiSpyware\SASSEH.DLL" [2013-05-07 115440]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux"=wdmaud.drv
.
[HKEY_LOCAL_MACHINE\system\currentcontrolset\control\session manager]
BootExecute REG_MULTI_SZ    autocheck autochk *\0\0sdnclean.exe
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\!SASCORE]
@=""
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^HP Digital Imaging Monitor.lnk]
path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\HP Digital Imaging Monitor.lnk
backup=c:\windows\pss\HP Digital Imaging Monitor.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]
2014-02-06 06:52 43848 ----a-w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\CanonMyPrinter]
2009-11-02 01:30 2508104 ----a-w- c:\program files\Canon\MyPrinter\BJMYPRT.EXE
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\QuickTime Task]
2011-07-05 23:36 421888 ----a-w- c:\program files\QuickTime\QTTask.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SUPERAntiSpyware]
2014-06-05 21:16 5626136 ----a-w- c:\program files\SUPERAntiSpyware\SUPERAntiSpyware.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\McAfeeAntiSpyware]
"DisableMonitoring"=dword:00000001
.
S2 !SASCORE;SAS Core Service;c:\program files\SUPERAntiSpyware\SASCORE.EXE [2013-10-10 120088]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceAndNoImpersonation REG_MULTI_SZ    FontCache
HPZ12 REG_MULTI_SZ    Pml Driver HPZ12 Net Driver HPZ12
hpdevmgmt REG_MULTI_SZ    hpqcxs08 hpqddsvc
.
Contents of the 'Scheduled Tasks' folder
.
2014-06-17 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-04-15 10:10]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com/
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~3\Office10\EXCEL.EXE/3000
TCP: DhcpNameServer = 24.159.64.23 24.178.162.3 71.9.127.107
FF - ProfilePath - c:\users\Rob\AppData\Roaming\Mozilla\Firefox\Profiles\zy73a0e4.default\
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-06-16 20:48
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ... 
.
scanning hidden autostart entries ...
.
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
  TOSCDSPD = c:\program files\TOSHIBA\TOSCDSPD\TOSCDSPD.exe?/i?????Z#6_??????U?8?U?p?U???U???
.
scanning hidden files ... 
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.midi\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ogg\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pcm\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pls\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.spx\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\UserChoice]
@Denied: (2) (LocalSystem)
"Progid"="YMP.Media"
.
[HKEY_USERS\S-1-5-21-502724121-2098707229-2709770299-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{9FD6924F-721E-DFC7-B229-056F8B8FD109}*]
@Allowed: (Read) (RestrictedCode)
"oaobmkajpaffjapongckmnjgokiopg"=hex:61,69,6d,6b,70,6b,67,6d,61,6d,64,68,62,61,
   61,6b,6b,66,65,62,67,6b,6b,62,66,68,69,70,64,70,69,61,6a,63,6c,64,69,6d,6c,\
"iadbkheeiphjeblald"=hex:6a,61,68,6f,70,68,65,6b,61,6a,68,6a,6b,64,67,63,63,66,
   63,6f,00,03
"hajbmicdjhedejpo"=hex:6a,61,68,6f,70,68,65,6b,61,6a,68,6a,6b,64,67,63,63,66,
   63,6f,00,02
.
[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
"MSCurrentCountry"=dword:000000b5
.
Completion time: 2014-06-16  20:51:18
ComboFix-quarantined-files.txt  2014-06-17 01:51
ComboFix2.txt  2014-06-16 18:39
ComboFix3.txt  2014-06-14 01:47
ComboFix4.txt  2014-04-20 02:55
ComboFix5.txt  2014-06-17 01:36
.
Pre-Run: 30,745,960,448 bytes free
Post-Run: 31,145,136,128 bytes free
.
- - End Of File - - 0294EE59319DD70106253CF9314AF784
5B5E648D12FCADC244C1EC30318E1EB9
 



#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 17 June 2014 - 06:32 AM





Hello Rob01

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit
2.Unzip the contents to a folder in a convenient location.
3.Open the folder where the contents were unzipped and run mbar.exe
4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.
6.Wait while the system shuts down and the cleanup process is performed.
7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:
  • •Internet access
    •Windows Update
    •Windows Firewall
9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.
10.Verify that your system is now functioning normally.


--RogueKiller--

Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
  • Quit all programs that you may have started.
  • Please disconnect any external drives from the computer before you run this scan!
  • For Vista or Windows 7, right-click and select "Run as Administrator to start"
  • For Windows XP, double-click to start.
  • Wait until Prescan has finished ...
  • Then Click on "Scan" button
  • Wait until the Status box shows "Scan Finished"
  • click on "delete"
  • Wait until the Status box shows "Deleting Finished"
  • Click on "Report" and copy/paste the content of the Notepad into your next reply.
  • the scan will make two reports the one I would like to see is called RKreport[2].txt on your Desktop
  • Exit/Close RogueKiller+
send me the reports made from MBAR and Roguekiller and also let me know how the computer is doing at this time.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 Rob01

Rob01
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:03:13 AM

Posted 17 June 2014 - 11:08 PM

Malware didnt find anything, it said it was clean. The RogueKiller found a hidden process and killed it. It also found a localhost 127.0.0.1, I am not sure what that is. I do know it is not my IP address. Is this a back door open?

 

Malwarebytes Anti-Rootkit BETA 1.07.0.1012
www.malwarebytes.org

Database version: v2014.06.17.10

Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Rob :: ROB-PC [administrator]

6/17/2014 2:09:56 PM
mbar-log-2014-06-17 (14-09-56).txt

Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled:
Objects scanned: 267519
Time elapsed: 14 minute(s), 44 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

Physical Sectors Detected: 0
(No malicious items detected)

(end)

 

 

 

RogueKiller V9.0.3.0 [Jun 17 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
Started in : Normal mode
User : Rob [Admin rights]
Mode : Remove -- Date : 06/17/2014  22:46:16

¤¤¤ Bad processes : 1 ¤¤¤
[Hidden]  -- [x] -> KILLED [TermThr]

¤¤¤ Registry Entries : 15 ¤¤¤
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\catchme -> NOT SELECTED
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\catchme -> NOT SELECTED
[Suspicious.Path] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\catchme -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters | DhcpNameServer : 65.32.5.111 65.32.5.112 192.168.1.1  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 65.32.5.111 65.32.5.112 192.168.1.1  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\Tcpip\Parameters | DhcpNameServer : 24.159.64.23 24.178.162.3 71.9.127.107  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{453B67CA-49EA-40D5-A558-CBCD84E9C21B} | DhcpNameServer : 65.32.5.111 65.32.5.112 192.168.1.1  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{D421E1AD-BACD-4436-AFE7-9B2DBE5C0E7E} | DhcpNameServer : 65.32.5.111 65.32.5.112 192.168.1.1  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{453B67CA-49EA-40D5-A558-CBCD84E9C21B} | DhcpNameServer : 65.32.5.111 65.32.5.112 192.168.1.1  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{D421E1AD-BACD-4436-AFE7-9B2DBE5C0E7E} | DhcpNameServer : 65.32.5.111 65.32.5.112 192.168.1.1  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\Tcpip\Parameters\Interfaces\{453B67CA-49EA-40D5-A558-CBCD84E9C21B} | DhcpNameServer : 24.159.64.23 24.178.162.3 71.9.127.107  -> NOT SELECTED
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet003\Services\Tcpip\Parameters\Interfaces\{D421E1AD-BACD-4436-AFE7-9B2DBE5C0E7E} | DhcpNameServer : 65.32.5.111 65.32.5.112 192.168.1.1  -> NOT SELECTED
[PUM.Policies] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | DisableRegistryTools : 0  -> NOT SELECTED
[PUM.DesktopIcons] HKEY_USERS\S-1-5-21-502724121-2098707229-2709770299-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu | {59031A47-3F72-44A7-89C5-5595FE6B30EE} : 1  -> NOT SELECTED
[PUM.DesktopIcons] HKEY_USERS\S-1-5-21-502724121-2098707229-2709770299-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031A47-3F72-44A7-89C5-5595FE6B30EE} : 1  -> NOT SELECTED

¤¤¤ Scheduled tasks : 0 ¤¤¤

¤¤¤ Files : 0 ¤¤¤

¤¤¤ HOSTS File : 1 ¤¤¤
[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1 localhost

¤¤¤ Antirootkit : 0 ¤¤¤

¤¤¤ Web browsers : 0 ¤¤¤

¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: Hitachi HTS541612J9SA00 ATA Device +++++
--- User ---
[MBR] 868cfee3bfdc583324224d42fb4c9dda
[BSP] 203ee6934b186edf49e3818926021234 : HP MBR Code
Partition table:
0 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 2048 | Size: 1500 MB
1 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 3074048 | Size: 112972 MB
User = LL1 ... OK
User = LL2 ... OK

============================================
RKreport_DEL_06142014_194633.log - RKreport_SCN_06142014_194453.log - RKreport_SCN_06172014_224554.log



#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 20 June 2014 - 09:17 AM


HitmanPro

  • Please download HitmanPro.
  • Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).
  • Click on the next button. You must agree with the terms of EULA.
  • Check the box beside "No, I only want to perform a one-time scan to check this computer".
  • Click on the next button.
  • The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.
  • When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!
  • Click on the next button.
  • Click on the "Export scan results to XML file".
  • Save that file to your desktop and zip and attach it in your next reply.

I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 25 June 2014 - 03:48 AM


Greetings


I have not heard from you in a couple of days so I am coming by to check on you to see if you are having problems or you just need some more time.

Also to remind you that it is very important that we finish the process completely so as to not get reinfected. I will let you know when we are complete and I will ask to remove our tools




Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:04:13 AM

Posted 03 July 2014 - 07:25 PM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users