Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with a Malware which fills up my temp folder with 5GB per day


  • Please log in to reply
8 replies to this topic

#1 S33W77

S33W77

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:43 PM

Posted 15 November 2014 - 01:01 PM

Hi,

 

I need help. My PC got infected with sometype of Malware couple weeks back. One morning there were about 20 popups on the desktop screen. I rebooted the PC. Later that week I noticed the malware was dumping files in C:/User/Appdata/Local/Temp folder with several GBs every day. The PC also got extremely sluggish. I am loosing about 5 to 8 GBs per day. I go and manually delete the folders in the temp folder, every few days.

 

Operating System:

Windows Vista Ultimate

32 Bit

 

I have done following so far:

Malwarebytes - found virus and quarantined them

Eset Online Scanner - ran it 3 times, found virus and quarantined them

TDSSKiller - found infection and cleaned it

Combofix - log attached

 

Thanks for your help. I sincerely appreciate it.

 

 

Attached Files



BC AdBot (Login to Remove)

 


#2 S33W77

S33W77
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:43 PM

Posted 15 November 2014 - 01:30 PM

Ran dds.com

 

logs attached.

Attached Files



#3 S33W77

S33W77
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:43 PM

Posted 15 November 2014 - 01:43 PM

screenshot attached of my daily routine of deleting temp files!

Attached Files



#4 S33W77

S33W77
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:43 PM

Posted 19 November 2014 - 02:28 PM

The PC was becoming unusable, extremely sluggish and I really needed it this morning to finish some work. So, after reading several posts here, I was suspecting a poweliks infection, and I ran two poweliks utilities

 

1.Symantec

2.Eset

 

Both utilities found poweliks infections and cleaned them. The PC has been running normal after removing poweliks infections. The core issue of TEMP folder getting filled up is not occurring any more. Also, the task manager has only limited processes present (previously there were at least twice as many processes running). Again the PC is extremely fast and the HD is not getting dumped with zillions of files in the temp folder.

 

However - I still want to proceed with an expert (whenever they are available) and go through each step of malware removal.

 

I am posting the Poweliks Eset Log below:

 

[2014.11.19 10:25:31.685] - Begin
[2014.11.19 10:25:31.685] -
[2014.11.19 10:25:31.685] -     ....................................
[2014.11.19 10:25:31.685] -   ..::::::::::::::::::....................
[2014.11.19 10:25:31.686] -   .::EEEEEE:::SSSSSS::..EEEEEE..TTTTTTTT..    Win32/Poweliks
[2014.11.19 10:25:31.687] -  .::EE::::EE:SS:::::::.EE....EE....TT......   Version: 1.0.0.1
[2014.11.19 10:25:31.688] -  .::EEEEEEEE::SSSSSS::.EEEEEEEE....TT......   Built: Oct 15 2014
[2014.11.19 10:25:31.689] -  .::EE:::::::::::::SS:.EE..........TT......
[2014.11.19 10:25:31.690] -   .::EEEEEE:::SSSSSS::..EEEEEE.....TT.....    Copyright © ESET, spol. s r.o.
[2014.11.19 10:25:31.690] -   ..::::::::::::::::::....................    1992-2013. All rights reserved.
[2014.11.19 10:25:31.690] -     ....................................
[2014.11.19 10:25:31.690] -
[2014.11.19 10:25:31.690] - --------------------------------------------------------------------------------
[2014.11.19 10:25:31.691] -
[2014.11.19 10:25:31.691] - INFO: OS: 6.0.6002 SP2
[2014.11.19 10:25:31.691] - INFO: Product Type: Workstation
[2014.11.19 10:25:31.691] - INFO: WoW64: False
[2014.11.19 10:25:31.692] - INFO: Machine guid: B91F9F18-C2D0-4A7E-AE54-F3A4EB6D0375
[2014.11.19 10:25:31.692] -
[2014.11.19 10:25:34.975] - INFO: Scanning for system infection...
[2014.11.19 10:25:34.975] - --------------------------------------------------------------------------------
[2014.11.19 10:25:34.975] -
[2014.11.19 10:25:34.975] - INFO: Processing [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]...
[2014.11.19 10:25:35.052] - INFO: Processing [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]...
[2014.11.19 10:25:35.053] - INFO: Processing [HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]...
[2014.11.19 10:25:35.080] - INFO: Processing [HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce]...
[2014.11.19 10:25:35.080] - INFO: Processing classes...
[2014.11.19 10:25:35.080] - INFO: Processing clsid [\Registry\User\S-1-5-21-3041473940-3898836339-1296592950-1000\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]
[2014.11.19 10:25:35.080] - WARNING: Found suspicous classid [\Registry\User\S-1-5-21-3041473940-3898836339-1296592950-1000\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]
[2014.11.19 10:25:35.080] - INFO: Processing clsid [\Registry\User\S-1-5-21-3041473940-3898836339-1296592950-1000\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]
[2014.11.19 10:25:35.080] - WARNING: Found suspicous classid [\Registry\User\S-1-5-21-3041473940-3898836339-1296592950-1000\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]
[2014.11.19 10:25:35.080] - INFO: Processing [HKLM\SOFTWARE\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32]...
[2014.11.19 10:25:35.080] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:35.081] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:35.081] - INFO: Processing invalid values in [HKLM\SOFTWARE\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32]...
[2014.11.19 10:25:35.081] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:35.081] - INFO: Processing value [ServerExecutable] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:35.081] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:35.081] - INFO: Processing value [ServerExecutable] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:35.081] - INFO: Processing invalid subkeys in [HKLM\SOFTWARE\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32]...
[2014.11.19 10:25:35.081] - INFO: Processing [HKLM\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]...
[2014.11.19 10:25:35.083] - INFO: Processing subkey [\Registry\Machine\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\InprocServer32]
[2014.11.19 10:25:35.083] - INFO: Processing subkey [\Registry\Machine\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\InprocServer32]
[2014.11.19 10:25:35.083] - INFO: Win32/Poweliks found
[2014.11.19 10:25:40.771] - INFO: Processing [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]...
[2014.11.19 10:25:40.772] - INFO: Processing [HKLM\Software\Microsoft\Windows\CurrentVersion\Run]...
[2014.11.19 10:25:40.772] - INFO: Processing [HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce]...
[2014.11.19 10:25:40.772] - INFO: Processing [HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce]...
[2014.11.19 10:25:40.772] - INFO: Processing classes...
[2014.11.19 10:25:40.772] - INFO: Processing clsid [\Registry\User\S-1-5-21-3041473940-3898836339-1296592950-1000\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]
[2014.11.19 10:25:40.772] - INFO: Deleted classid [\Registry\User\S-1-5-21-3041473940-3898836339-1296592950-1000\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]
[2014.11.19 10:25:40.773] - INFO: Processing [HKLM\SOFTWARE\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32]...
[2014.11.19 10:25:40.773] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:40.773] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:40.773] - INFO: Processing invalid values in [HKLM\SOFTWARE\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32]...
[2014.11.19 10:25:40.773] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:40.773] - INFO: Processing value [ServerExecutable] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:40.773] - INFO: Processing value [] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:40.773] - INFO: Processing value [ServerExecutable] = [%systemroot%\system32\wbem\wmiprvse.exe]
[2014.11.19 10:25:40.773] - INFO: Processing invalid subkeys in [HKLM\SOFTWARE\Classes\CLSID\{73E709EA-5D93-4B2E-BBB0-99B7938DA9E4}\LocalServer32]...
[2014.11.19 10:25:40.773] - INFO: Processing [HKLM\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}]...
[2014.11.19 10:25:40.773] - INFO: Processing subkey [\Registry\Machine\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\InprocServer32]
[2014.11.19 10:25:40.773] - INFO: Processing subkey [\Registry\Machine\SOFTWARE\Classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\InprocServer32]
[2014.11.19 10:25:40.773] - INFO: Cleaning status: 0
[2014.11.19 10:25:45.692] - End
 



#5 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,600 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:43 PM

Posted 20 November 2014 - 03:00 PM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/556268 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from the following link if you no longer have it available and save it to your destop.

    DDS.com Download Link
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control can be found HERE.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#6 S33W77

S33W77
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:43 PM

Posted 23 November 2014 - 04:14 AM

Answers to your questions
1. PC was dumping 5 Gb to 8 GB of temp files. I suspected Powelik and ran Symantec and Eset cleaners to remove the infections. The initial issue seems to be gone for now.
2. New DDS Log attached below
3. I do not have the original Windows XP CD.



DDS (Ver_2012-11-20.01) - NTFS_x86
Internet Explorer: 9.0.8112.16592
Run by Home at 3:04:27 on 2014-11-23
Microsoft® Windows Vista™ Ultimate 6.0.6002.2.1252.1.1033.18.2004.1077 [GMT -6:00]
.
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\System32\spoolsv.exe
C:\Program Files\Common Files\Adobe\ARM\1.0\armsvc.exe
C:\Program Files\Intel\AMT\atchksrv.exe
C:\Program Files\Intel\Intel Matrix Storage Manager\Iaantmon.exe
C:\Program Files\LogMeIn\x86\LMIGuardianSvc.exe
C:\Program Files\LogMeIn\x86\RaMaint.exe
C:\Program Files\Intel\AMT\LMS.exe
C:\Program Files\Common Files\Motive\McciCMService.exe
C:\Program Files\Intel\AMT\UNS.exe
C:\Windows\system32\SearchIndexer.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Windows\system32\taskeng.exe
C:\Windows\Explorer.EXE
C:\Windows\System32\hkcmd.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Intel\AMT\atchk.exe
C:\Program Files\LogMeIn\x86\LogMeInSystray.exe
C:\Windows\system32\igfxsrvc.exe
C:\Windows\system32\taskeng.exe
C:\Program Files\digiCHECK Exchange\DI4Update.exe
C:\Program Files\LogMeIn\x86\LogMeIn.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
C:\Windows\system32\svchost.exe -k SDRSVC
C:\Windows\System32\svchost.exe -k secsvcs
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxps://www.google.com/
BHO: Adobe PDF Link Helper: {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelperShim.dll
BHO: Groove GFS Browser Helper: {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
uRun: [ehTray.exe] c:\windows\ehome\ehTray.exe
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [atchk] "c:\program files\intel\amt\atchk.exe"
mRun: [IAAnotif] "c:\program files\intel\intel matrix storage manager\Iaanotif.exe"
mRun: [LogMeIn GUI] "c:\program files\logmein\x86\LogMeInSystray.exe"
mRun: [GrooveMonitor] "c:\program files\microsoft office\office12\GrooveMonitor.exe"
mRun: [SoundMAXPnP] c:\program files\analog devices\core\smax4pnp.exe
mRun: [Adobe ARM] "c:\program files\common files\adobe\arm\1.0\AdobeARM.exe"
uPolicies-Explorer: NoDrives = dword:0
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-Explorer: NoDrives = dword:0
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dll
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
Trusted Zone: imagedepositgateway.com
DPF: {7530BFB8-7293-4D34-9923-61A11451AFC5} - hxxp://download.eset.com/special/eos/OnlineScanner.cab
DPF: {86F81E8A-C05C-4495-A235-8693E8D08AE3} - hxxps://ssl.selectpayment.com/clientfiles/RDC_x86x64_VisionX.cab
DPF: {E0FEE963-BB53-4215-81AD-B28C77384644} - hxxps://pattcw.att.motive.com/wizlet/DSLActivation/static/installer/ATTInternetInstaller.cab
DPF: {FD0B6769-6490-4A91-AA0A-B5AE0DC75AC9} - hxxps://secure.logmein.com//activex/ractrl.cab?lmi=1074
TCP: NameServer = 192.168.1.254
TCP: Interfaces\{A598BE7E-6125-43B7-B1B7-0E01F5826DD9} : DHCPNameServer = 192.168.1.254
Handler: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - c:\program files\microsoft office\office12\GrooveSystemServices.dll
Notify: igfxcui - igfxdev.dll
SEH: Groove GFS Stub Execution Hook - {B5A7F190-DDA6-4420-B3BA-52453494E6CD} - c:\program files\microsoft office\office12\GrooveShellExtensions.dll
LSA: Security Packages = kerberos msv1_0 schannel wdigest tspkg
mASetup: {8A69D345-D564-463c-AFF1-A69D9E530F96} - "c:\program files\google\chrome\application\39.0.2171.65\installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --multi-install --chrome
IFEO: ehshell.exe - "c:\program files\logmein\x86\LogMeInSystray.exe" -MceShellRedirect
.
============= SERVICES / DRIVERS ===============
.
R0 nlem32nt;nlem32nt;c:\windows\system32\drivers\nlem32nt.sys [2014-7-16 69624]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 LMIGuardianSvc;LMIGuardianSvc;c:\program files\logmein\x86\LMIGuardianSvc.exe [2011-12-7 375144]
R2 LMIInfo;LogMeIn Kernel Information Provider;c:\program files\logmein\x86\rainfo.sys [2011-9-16 13624]
R2 LMIRfsDriver;LogMeIn Remote File System Driver;c:\windows\system32\drivers\LMIRfsDriver.sys [2012-1-16 47640]
R2 UNS;Intel® Active Management Technology User Notification Service;c:\program files\intel\amt\UNS.exe [2012-1-16 2521880]
R3 TSUSB2;Driver for TellerScan Device;c:\windows\system32\drivers\TsUSB2.sys [2012-1-16 54016]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2013-9-11 105144]
S3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2008-1-20 179712]
S3 WPFFontCache_v0400;Windows Presentation Foundation Font Cache 4.0.0.0;c:\windows\microsoft.net\framework\v4.0.30319\wpf\WPFFontCache_v0400.exe [2013-9-11 770168]
S3 WSDScan;WSD Scan Support via UMB;c:\windows\system32\drivers\WSDScan.sys [2012-1-19 19968]
.
=============== Created Last 30 ================
.
2014-11-22 08:15:35 62576 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{2c926846-2600-4a6e-9e74-35e33a142fd2}\offreg.dll
2014-11-21 09:59:22 8941456 ----a-w- c:\programdata\microsoft\windows defender\definition updates\{2c926846-2600-4a6e-9e74-35e33a142fd2}\mpengine.dll
2014-11-19 19:52:31 -------- d-----w- c:\program files\ESET
2014-11-19 18:17:58 -------- d-----w- c:\users\home\appdata\local\LogMeInIgnition
2014-11-19 09:01:45 499200 ----a-w- c:\windows\system32\kerberos.dll
2014-11-15 00:49:43 -------- d-sh--w- C:\$RECYCLE.BIN
2014-11-15 00:44:48 -------- d-----w- c:\users\home\appdata\local\temp
2014-11-12 09:11:24 146432 ----a-w- c:\windows\system32\msaudite.dll
2014-11-12 09:11:23 619520 ----a-w- c:\windows\system32\adtschema.dll
2014-11-12 09:11:23 449536 ----a-w- c:\windows\system32\termsrv.dll
2014-11-12 09:11:22 1259008 ----a-w- c:\windows\system32\lsasrv.dll
2014-11-12 09:11:08 2048 ----a-w- c:\windows\system32\msxml3r.dll
2014-11-12 09:11:08 1249280 ----a-w- c:\windows\system32\msxml3.dll
2014-11-12 09:10:39 278528 ----a-w- c:\windows\system32\schannel.dll
2014-11-12 09:10:26 67072 ----a-w- c:\windows\system32\packager.dll
2014-11-12 09:10:09 729600 ----a-w- c:\windows\system32\IMJP10K.DLL
2014-11-12 09:08:31 396800 ----a-w- c:\windows\system32\AudioEng.dll
2014-11-12 09:08:31 316928 ----a-w- c:\windows\system32\audiosrv.dll
2014-11-12 09:08:31 274432 ----a-w- c:\windows\system32\AUDIOKSE.dll
2014-11-12 09:08:31 170496 ----a-w- c:\windows\system32\EncDump.dll
2014-11-12 09:08:19 564224 ----a-w- c:\windows\system32\oleaut32.dll
2014-11-12 09:00:40 2054656 ----a-w- c:\windows\system32\win32k.sys
2014-11-10 15:37:11 114904 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-11-10 15:37:00 75480 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-11-10 15:37:00 51928 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-11-10 15:37:00 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-11-10 15:37:00 -------- d-----w- c:\programdata\Malwarebytes
2014-11-10 15:37:00 -------- d-----w- c:\program files\Malwarebytes Anti-Malware
.
==================== Find3M ====================
.
2014-11-04 20:30:58 229000 ------w- c:\windows\system32\MpSigStub.exe
2014-11-04 14:29:41 86912 ----a-w- c:\windows\system32\LMIRfsClientNP.dll
2014-11-04 14:29:41 53096 ----a-w- c:\windows\system32\spool\prtprocs\w32x86\LMIproc.dll
2014-11-04 14:29:40 85864 ----a-w- c:\windows\system32\LMIinit.dll
2014-11-04 14:29:40 31592 ----a-w- c:\windows\system32\LMIport.dll
2014-10-27 19:05:44 1810944 ----a-w- c:\windows\system32\jscript9.dll
2014-10-27 18:59:06 1129472 ----a-w- c:\windows\system32\wininet.dll
2014-10-27 18:58:19 1427968 ----a-w- c:\windows\system32\inetcpl.cpl
2014-10-27 18:56:58 142848 ----a-w- c:\windows\system32\ieUnatt.exe
2014-10-27 18:56:40 421376 ----a-w- c:\windows\system32\vbscript.dll
2014-10-27 18:55:20 2382848 ----a-w- c:\windows\system32\mshtml.tlb
2014-10-27 18:55:17 11776 ----a-w- c:\windows\system32\mshta.exe
2014-10-23 14:29:33 86912 ----a-w- c:\windows\system32\LMIRfsClientNP.dll.000.bak
2014-09-04 23:27:58 143360 ----a-w- c:\windows\system32\drivers\fastfat.sys
.
============= FINISH: 3:05:01.78 ===============

Edited by S33W77, 23 November 2014 - 04:17 AM.


#7 nasdaq

nasdaq

  • Malware Response Team
  • 38,756 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:02:43 PM

Posted 23 November 2014 - 09:42 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.
 
If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===
 
Run this tool to clean your Temporary files/Folders.
 
Download TFC to your desktop
  •  
  • Close any open windows.
  • Double click the TFC icon to run the program.
  • TFC will close all open programs itself in order to run.
  • Click the Start button to begin the process.
  • Allow TFC to run uninterrupted, it should not take long to finish.
  • Once it's finished, click OK to reboot.
  • If it does not reboot, reboot your system manually.
  •  
===
 
 
Download the version of this tool for your operating system.
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
===
 
Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.
 
Wait for further instructions.


#8 S33W77

S33W77
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:12:43 PM

Posted 28 November 2014 - 01:17 AM

Hi Nasdaq,

 

Please allow me until Monday 12/01 to perform these additional scans. I am travelling due to thanksgiving. Thanks.



#9 nasdaq

nasdaq

  • Malware Response Team
  • 38,756 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:02:43 PM

Posted 28 November 2014 - 08:56 AM

No problems.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users