Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

MBR Infection


  • This topic is locked This topic is locked
7 replies to this topic

#1 667225

667225

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:01 AM

Posted 09 December 2014 - 01:07 AM

About a week or more ago I noticed our Windows 8 computer could no longer download Defender definitions with an error or connection failed code either direct within Defender or via Windows Update. At first I thought it was a corrupted file due to an incomplete shutdown but about 4 days later a non-networked Windows 7 laptop that only shares a wireless router experienced the same problem.

I am just now understanding they somehow both have some type of MBR, bootkit, rootkit infection. I tried a bunch of different programs like Malwarebytes, Adwcleaner, Frst, Junkware Removal, RKill, Detekt, Defender, TSSDKiller, Roguekiller but I have no idea how to interpret the results other than understanding the MBR infection code on the Roguekiller log saying User != LL2 ... KO! Unknown MBR Code.

I am scared because I don't know what this means or how to fix it. I want to try and make sure all my user names and passwords are safe but I can't reset any since I don't have access to a clean computer. Every second we have the computer on scares us that something horrible is happening that we need to fix but don't know how.

Is our modem or router also infected?

Attached Files


Edited by 667225, 09 December 2014 - 01:45 AM.


BC AdBot (Login to Remove)

 


m

#2 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,549 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:01 AM

Posted 14 December 2014 - 01:10 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> http://www.bleepingcomputer.com/logreply/559149 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new DDS log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download DDS by sUBs from the following link if you no longer have it available and save it to your destop.

    DDS.com Download Link
  • Double click on the DDS icon, allow it to run.
  • A small box will open, with an explanation about the tool. No input is needed, the scan is running.
  • Notepad will open with the results.
  • Follow the instructions that pop up for posting the results.
  • Close the program window, and delete the program from your desktop.
Please note: You may have to disable any script protection running if the scan fails to run. After downloading the tool, disconnect from the internet and disable all antivirus protection. Run the scan, enable your A/V and reconnect to the internet.

Information on A/V control can be found HERE.

As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#3 667225

667225
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:01 AM

Posted 15 December 2014 - 07:08 PM

Apparent issues started at the end of last month.  A Windows 8, not 8.1, desktop computer experienced shutdown issues where it wouldn't automatically turn off when clicking shutdown and would only turn off after holding the power button.  That happened for about 3-4 days straight.  On the second day after that first non-shutdown, I noticed Defender would no longer be able to install its definitions.  I have Windows Update to notify me rather than install updates automatically so I noticed as soon as it started since I check daily.  The definitions would not install either through the WU interface nor Defender.

I was attempting to troubleshoot that for a couple of days thinking it was a corrupted file or setting somewhere due to the shutdown issues.  Tried things like system restore to an earlier date, sfc /scannow, Dism /Online /Cleanup-Image /RestoreHealth, using the Windows built in WU troubleshooter as well as the one from http://go.microsoft.com/?linkid=9830262.

About 4 days after the issue with that computer started, I noticed a Windows 7 laptop was now no longer able to download its Microsoft Security Essentials definitions also.  It was up until that point.  I found that odd so started thinking perhaps it was more along the lines of a malware/virus issue.

One additional thing.  I had used OpenDNS on the Windows 8 computer starting in the beginning of November but not on the Windows 7 laptop.  I confirmed both were working correctly at that time via https://store.opendns.com/settings but I noticed the Windows 8 computer was now saying that it wasn't.  I wasn't able to figure out what DNS servers it was using at that point but I just went ahead and removed the OpenDNS ones and reverted it back to obtain them automatically.  Checked both computers and router to verify all settings appeared as they should at that time.

Since that time I have tried multiple scans with Defender, Malwarebytes, RKill, FRST, DDS, TDSSKiller, Malwarebytes Anti-Rootkit, Adwcleaner, Roguekiller, and used Junkware Removal Tool once on the Windows 8 computer but didn't like it deleted things automatically (only a Firefox minidumps folder and event logs files) so didn't want to try on the Windows 7 laptop in case it would delete a legit folder I didn't want it to (I noticed at that point some people mentioning it doing so).  I don't understand most of these things though so I wasn't entirely sure I was using them properly (especially TDSSKiller and RogueKiller).  I didn't delete anything though as the things I understood were either clean or false positives like Roguekiller listing Adblock Plus and NoScript unchecked for information purposes.

 

The thing that made me think it were definitely malware/virus related, in addition to the issues, was when Roguekiller listed things in the MBR check that confused me.  It said User = LL1 ... OK User != LL2 ... KO! and shows 4 partitions under User and another 2 under the LL2 section.  Using Windows Disk Management only lists 4 partitions (the ones that match up in size with the 4 Roguekiller lists under User).  I am not sure what the other 2 correspond to (no other harddrive was connected during the scan).

I tried asking for help on the Malwarebytes forum but I couldn't seem to figure out how to post as it said I was unable to post.  I did email them, before asking for help here, and they responded a couple/few days later.  They had me run ComboFix and Malwarebytes Anti-Rootkit and said everything looked fine.  

But, if you are willing to check anything on the chance it confirms everything is good or anything might catch your eye, I figure it can't hurt as long as you don't mind.  The defintions now seem to be working again for no apparent reason.  They started working again on each computer a couple of days apart (oddly, in reverse order from stopping).

This is for the Windows 7 laptop (between the two, this one had a thing or two in the logs I understood less).  Ran programs from the desktop as admin with MSE/Defender turned off, Malwarebytes exited out of and Anti-Exploit stopped.  Turned off the wireless button to disconnect from internet (hope that was enough rather than turning off router/modem).  It says to zip and attach the log but I don't know how to zip something so hopefully just attaching is okay.

 

Thank you.

Attached Files


Edited by 667225, 15 December 2014 - 07:10 PM.


#4 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:01 AM

Posted 16 December 2014 - 10:23 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the Report button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleaner[Sn].txt (n is a number).
===

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
===

Please paste the logs in your next reply DO NOT ATTACH THEM unless specified.
To attach a file select the "More Reply Option" and follow the instructions.

Wait for further instructions.

#5 667225

667225
  • Topic Starter

  • Members
  • 7 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:01 AM

Posted 16 December 2014 - 04:09 PM

I unchecked all items listed in AdwCleaner as they are just saved game folders and the default IE links.
 
# AdwCleaner v4.105 - Report created 16/12/2014 at 12:19:43
# Updated 08/12/2014 by Xplode
# Database : 2014-12-13.4 [Live]
# Operating System : Windows 7 Home Premium Service Pack 1 (64 bits)
# Username : Dee - DEE-HP
# Running from : C:\Users\Dee\Desktop\AdwCleaner.exe
# Option : Scan

***** [ Services ] *****


***** [ Files / Folders ] *****

Folder Found : C:\ProgramData\Alawar
Folder Found : C:\ProgramData\Alawar Stargaze
Folder Found : C:\Users\Dee\AppData\Roaming\Alawar
Folder Found : C:\Users\Dee\AppData\Roaming\Alawar Stargaze
Folder Found : C:\Users\Public\Documents\iWin

***** [ Scheduled Tasks ] *****


***** [ Shortcuts ] *****


***** [ Registry ] *****

Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{B7FCA997-D0FB-4FE0-8AFD-255E89CF9671}
Key Found : [x64] HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{D43B3890-80C7-4010-A95D-1E77B5924DC3}
Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2fa28606-de77-4029-af96-b231e3b8f827}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{B7FCA997-D0FB-4FE0-8AFD-255E89CF9671}
Key Found : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{D43B3890-80C7-4010-A95D-1E77B5924DC3}
Value Found : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA}]

***** [ Browsers ] *****

-\\ Internet Explorer v11.0.9600.17496


-\\ Mozilla Firefox v34.0.5 (x86 en-US)


*************************

AdwCleaner[R0].txt - [2056 octets] - [16/12/2014 12:19:43]

########## EOF - C:\AdwCleaner\AdwCleaner[R0].txt - [2116 octets] ##########

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 14-12-2014 01
Ran by Dee (administrator) on DEE-HP on 16-12-2014 12:24:47
Running from C:\Users\Dee\Desktop
Loaded Profile: Dee (Available profiles: Dee)
Platform: Windows 7 Home Premium Service Pack 1 (X64) OS Language: English (United States)
Internet Explorer Version 11
Boot Mode: Normal
Tutorial for Farbar Recovery Scan Tool: http://www.geekstogo.com/forum/topic/335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool/

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(HP) C:\Program Files (x86)\HP SimplePass 2011\TrueSuiteService.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\MsMpEng.exe
(IDT, Inc.) C:\Program Files\IDT\WDM\stacsv64.exe
(Hewlett-Packard Company) C:\Program Files\Hewlett-Packard\HP Client Services\HPClientServices.exe
(Hewlett-Packard Company) C:\Program Files (x86)\Hewlett-Packard\Shared\HPDrvMntSvc.exe
(Hewlett-Packard Development Company, L.P.) C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPWMISVC.exe
(Realsil Microelectronics Inc.) C:\Program Files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Services\IPT\jhi_service.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Exploit\mbae-svc.exe
(HP) C:\Program Files (x86)\HP SimplePass 2011\TouchControl.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Exploit\mbae64.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe
(HP) C:\Program Files (x86)\HP SimplePass 2011\BioMonitor.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Malware\mbam.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPEnh.exe
(IDT, Inc.) C:\Program Files\IDT\WDM\sttray64.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\msseces.exe
(Microsoft Corp.) C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVCM.EXE
(Intel Corporation) C:\Windows\System32\hkcmd.exe
(Intel Corporation) C:\Windows\System32\igfxpers.exe
(Microsoft Corporation) C:\Windows\System32\StikyNot.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe
(Hewlett-Packard Company) C:\Program Files (x86)\Hewlett-Packard\HP QuickWeb\hpqwutils.exe
(Hewlett-Packard Development Company, L.P.) C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe
(Hewlett-Packard Development Company, L.P.) C:\Program Files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe
(Malwarebytes Corporation) C:\Program Files (x86)\Malwarebytes Anti-Exploit\mbae.exe
(Hewlett-Packard Company) C:\Program Files (x86)\Hewlett-Packard\Shared\hpqWmiEx.exe
(Synaptics Incorporated) C:\Program Files\Synaptics\SynTP\SynTPHelper.exe
(Microsoft Corporation) C:\Program Files\Microsoft Security Client\NisSrv.exe
(Hewlett-Packard Company) C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\HPSA_Service.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe
(Intel Corporation) C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe
(Microsoft Corporation) C:\Windows\System32\audiodg.exe


==================== Registry (Whitelisted) ==================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM\...\Run: [SynTPEnh] => C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [2799912 2011-06-09] (Synaptics Incorporated)
HKLM\...\Run: [SysTrayApp] => C:\Program Files\IDT\WDM\sttray64.exe [1128448 2011-06-07] (IDT, Inc.)
HKLM\...\Run: [SetDefault] => C:\Program Files\Hewlett-Packard\HP LaunchBox\SetDefault.exe [42808 2011-06-27] (Hewlett-Packard Development Company, L.P.)
HKLM\...\Run: [MSC] => c:\Program Files\Microsoft Security Client\msseces.exe [1331288 2014-08-22] (Microsoft Corporation)
HKLM-x32\...\Run: [IAStorIcon] => C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe [284440 2011-04-29] (Intel Corporation)
HKLM-x32\...\Run: [] => [X]
HKLM-x32\...\Run: [HPQuickWebProxy] => C:\Program Files (x86)\Hewlett-Packard\HP QuickWeb\hpqwutils.exe [168504 2011-06-28] (Hewlett-Packard Company)
HKLM-x32\...\Run: [HP Quick Launch] => C:\Program Files (x86)\Hewlett-Packard\HP Quick Launch\HPMSGSVC.exe [586808 2011-04-08] (Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [HPOSD] => C:\Program Files (x86)\Hewlett-Packard\HP On Screen Display\HPOSD.exe [318520 2011-01-27] (Hewlett-Packard Development Company, L.P.)
HKLM-x32\...\Run: [Malwarebytes Anti-Exploit] => C:\Program Files (x86)\Malwarebytes Anti-Exploit\mbae.exe [2561848 2014-12-10] (Malwarebytes Corporation)
Winlogon\Notify\igfxcui: C:\Windows\system32\igfxdev.dll (Intel Corporation)
HKU\S-1-5-21-2807582641-1589491884-1559589272-1000\...\Run: [RESTART_STICKY_NOTES] => C:\Windows\System32\StikyNot.exe [427520 2009-07-13] (Microsoft Corporation)

==================== Internet (Whitelisted) ====================

(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)

HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\S-1-5-21-2807582641-1589491884-1559589272-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
HKU\.DEFAULT\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=msnhome
HKU\S-1-5-21-2807582641-1589491884-1559589272-1000\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.msn.com/
HKU\S-1-5-21-2807582641-1589491884-1559589272-1000\Software\Microsoft\Internet Explorer\Main,Search Page = http://www.microsoft.com/isapi/redir.dll?prd=ie&ar=iesearch
StartMenuInternet: IEXPLORE.EXE - C:\Program Files (x86)\Internet Explorer\iexplore.exe
SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKLM -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = http://search.yahoo.com/search?p={searchTerms}&ei={inputEncoding}&fr=chr-hp-psg&type=HPNTDF
SearchScopes: HKLM -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
SearchScopes: HKLM -> {D944BB61-2E34-4DBF-A683-47E505C587DC} URL = http://rover.ebay.com/rover/1/711-30572-11896-2/4?mpre=http://shop.ebay.com/?_nkw={searchTerms}
SearchScopes: HKLM -> {EE9C9F67-EBAB-4C77-9FB8-792CAB36A2A4} URL = http://www.amazon.com/s/ref=azs_osd_iea?ie=UTF-8&tag=hp-us2-vsb-20&link%5Fcode=qs&index=aps&field-keywords={searchTerms}
SearchScopes: HKLM-x32 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKLM-x32 -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = http://search.yahoo.com/search?p={searchTerms}&ei={inputEncoding}&fr=chr-hp-psg&type=HPNTDF
SearchScopes: HKLM-x32 -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
SearchScopes: HKLM-x32 -> {D944BB61-2E34-4DBF-A683-47E505C587DC} URL = http://rover.ebay.com/rover/1/711-30572-11896-2/4?mpre=http://shop.ebay.com/?_nkw={searchTerms}
SearchScopes: HKLM-x32 -> {EE9C9F67-EBAB-4C77-9FB8-792CAB36A2A4} URL = http://www.amazon.com/s/ref=azs_osd_iea?ie=UTF-8&tag=hp-us2-vsb-20&link%5Fcode=qs&index=aps&field-keywords={searchTerms}
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {b7fca997-d0fb-4fe0-8afd-255e89cf9671} URL = http://search.yahoo.com/search?p={searchTerms}&ei={inputEncoding}&fr=chr-hp-psg&type=HPNTDF
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {d43b3890-80c7-4010-a95d-1e77b5924dc3} URL = http://en.wikipedia.org/wiki/Special:Search?search={searchTerms}
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {D944BB61-2E34-4DBF-A683-47E505C587DC} URL = http://rover.ebay.com/rover/1/711-30572-11896-2/4?mpre=http://shop.ebay.com/?_nkw={searchTerms}
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {EE9C9F67-EBAB-4C77-9FB8-792CAB36A2A4} URL = http://www.amazon.com/s/ref=azs_osd_iea?ie=UTF-8&tag=hp-us2-vsb-20&link%5Fcode=qs&index=aps&field-keywords={searchTerms}
BHO: TrueSuite Website Log On -> {8590886E-EC8C-43C1-A32C-E4C2B0B6395B} -> C:\Program Files (x86)\HP SimplePass 2011\x64\IEBHO.dll (HP)
BHO: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
BHO-x32: TrueSuite Website Log On -> {8590886E-EC8C-43C1-A32C-E4C2B0B6395B} -> C:\Program Files (x86)\HP SimplePass 2011\IEBHO.dll (HP)
BHO-x32: Windows Live ID Sign-in Helper -> {9030D464-4C02-4ABF-8ECC-5164760863C6} -> C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll (Microsoft Corp.)
Toolbar: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> No Name - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - No File
Tcpip\Parameters: [DhcpNameServer] 192.168.0.1

FireFox:
========
FF ProfilePath: C:\Users\Dee\AppData\Roaming\Mozilla\Firefox\Profiles\rt6u0iph.default
FF DefaultSearchEngine: Startpage Search Engine
FF SelectedSearchEngine: Startpage Search Engine
FF Homepage: hxxp://www.msn.com/
FF Plugin: @adobe.com/FlashPlayer -> C:\Windows\system32\Macromed\Flash\NPSWF64_16_0_0_235.dll ()
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\Windows\SysWOW64\Macromed\Flash\NPSWF32_16_0_0_235.dll ()
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3502.0922 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=15.4.3508.1109 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll (Microsoft Corporation)
FF Plugin-x32: @oberon-media.com/ONCAdapter -> C:\Program Files (x86)\Common Files\Oberon Media\NCAdapter\1.0.0.8\npapicomadapter.dll No File
FF Plugin-x32: @WildTangent.com/GamesAppPresenceDetector,Version=1.0 -> C:\Program Files (x86)\WildTangent Games\App\BrowserIntegration\Registered\11\NP_wtapp.dll ()
FF SearchPlugin: C:\Users\Dee\AppData\Roaming\Mozilla\Firefox\Profiles\rt6u0iph.default\searchplugins\startpage-search-engine.xml
FF Extension: NoScript - C:\Users\Dee\AppData\Roaming\Mozilla\Firefox\Profiles\rt6u0iph.default\Extensions\{73a6fe31-595d-460b-a920-fcc0f8843232}.xpi [2013-08-28]
FF Extension: Adblock Plus - C:\Users\Dee\AppData\Roaming\Mozilla\Firefox\Profiles\rt6u0iph.default\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2013-09-03]
FF Extension: TrueSuite Website Logon - C:\Program Files (x86)\Mozilla Firefox\extensions\websitelogon@truesuite.com [2014-12-13]

Chrome:
=======
CHR HKLM-x32\...\Chrome\Extension: [hdhihajbmafmgilcciomnamcjfkdhikl] - C:\Program Files (x86)\HP SimplePass 2011\tschrome.crx [2011-04-13]

==================== Services (Whitelisted) =================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

R2 IconMan_R; C:\Program Files (x86)\Realtek\Realtek PCIE Card Reader\RIconMan.exe [2372096 2011-02-18] (Realsil Microelectronics Inc.) [File not signed]
R2 MbaeSvc; C:\Program Files (x86)\Malwarebytes Anti-Exploit\mbae-svc.exe [555320 2014-12-10] (Malwarebytes Corporation)
R2 MBAMScheduler; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamscheduler.exe [1871160 2014-11-21] (Malwarebytes Corporation)
R2 MBAMService; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe [969016 2014-11-21] (Malwarebytes Corporation)
R2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [23784 2014-08-22] (Microsoft Corporation)
R3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [368624 2014-08-22] (Microsoft Corporation)

==================== Drivers (Whitelisted) ====================

(If an entry is included in the fixlist, the service will be removed from the registry. The file will not be moved unless listed separately.)

U5 AppMgmt; C:\Windows\system32\svchost.exe [27136 2009-07-13] (Microsoft Corporation)
R1 ESProtectionDriver; C:\Program Files (x86)\Malwarebytes Anti-Exploit\mbae64.sys [63064 2014-12-10] ()
R3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [25816 2014-11-21] (Malwarebytes Corporation)
R3 MBAMSwissArmy; C:\Windows\system32\drivers\MBAMSwissArmy.sys [129752 2014-12-16] (Malwarebytes Corporation)
R3 MBAMWebAccessControl; C:\Windows\system32\drivers\mwac.sys [63704 2014-11-21] (Malwarebytes Corporation)
R0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [269008 2014-07-17] (Microsoft Corporation)
R2 NisDrv; C:\Windows\System32\DRIVERS\NisDrvWFP.sys [125584 2014-07-17] (Microsoft Corporation)
S3 Serial; C:\Windows\system32\drivers\serial.sys [94208 2009-07-13] (Brother Industries Ltd.)
U3 TrueSight; C:\Windows\System32\drivers\TrueSight.sys [35064 2014-12-13] ()
S3 catchme; \??\C:\ComboFix\catchme.sys [X]
S3 clwvd; system32\DRIVERS\clwvd.sys [X]

==================== NetSvcs (Whitelisted) ===================

(If an item is included in the fixlist, it will be removed from the registry. Any associated file could be listed separately to be moved.)


==================== One Month Created Files and Folders ========

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-12-16 12:24 - 2014-12-16 12:25 - 00015232 _____ () C:\Users\Dee\Desktop\FRST.txt
2014-12-16 12:24 - 2014-12-16 12:24 - 00000000 ____D () C:\FRST
2014-12-16 12:19 - 2014-12-16 12:20 - 00002228 _____ () C:\Users\Dee\Downloads\AdwCleaner[R0].txt
2014-12-16 11:38 - 2014-12-16 11:38 - 00000000 ____D () C:\Windows\CheckSur
2014-12-15 19:37 - 2014-12-15 19:37 - 00007600 _____ () C:\Users\Dee\AppData\Local\Resmon.ResmonCfg
2014-12-15 15:13 - 2014-12-15 15:14 - 00002122 _____ () C:\Users\Dee\Downloads\Rkill.txt
2014-12-15 15:10 - 2014-12-15 15:11 - 00007723 _____ () C:\Users\Dee\Downloads\detekt.log
2014-12-15 15:03 - 2014-12-15 15:03 - 00030643 _____ () C:\Users\Dee\Downloads\Addition.txt
2014-12-15 15:02 - 2014-12-15 15:03 - 00034540 _____ () C:\Users\Dee\Downloads\FRST.txt
2014-12-15 15:02 - 2014-12-15 15:03 - 00000000 ____D () C:\Users\Dee\Downloads\FRST
2014-12-15 14:57 - 2014-12-15 14:57 - 00018157 _____ () C:\Users\Dee\Downloads\dds.txt
2014-12-15 14:57 - 2014-12-15 14:57 - 00011273 _____ () C:\Users\Dee\Downloads\attach.txt
2014-12-15 14:34 - 2014-12-15 14:35 - 18315864 _____ () C:\Users\Dee\Downloads\RogueKillerX64.exe
2014-12-15 14:33 - 2014-12-15 14:34 - 15201368 _____ () C:\Users\Dee\Downloads\RogueKiller.exe
2014-12-15 14:32 - 2014-12-15 14:33 - 16448208 _____ (Malwarebytes Corp.) C:\Users\Dee\Downloads\mbar-1.08.2.1001.exe
2014-12-15 14:32 - 2014-12-15 14:33 - 02166272 _____ () C:\Users\Dee\Downloads\AdwCleaner.exe
2014-12-15 14:31 - 2014-12-15 14:31 - 02119168 _____ (Farbar) C:\Users\Dee\Desktop\FRST64.exe
2014-12-15 14:30 - 2014-12-15 14:32 - 27806772 _____ () C:\Users\Dee\Downloads\detekt.exe
2014-12-15 14:01 - 2014-12-15 14:28 - 01940728 _____ (Bleeping Computer, LLC) C:\Users\Dee\Downloads\rkill.exe
2014-12-15 14:01 - 2014-12-15 14:01 - 00688992 ____R (Swearware) C:\Users\Dee\Downloads\dds.com
2014-12-14 16:30 - 2014-12-15 14:32 - 04187592 _____ (Kaspersky Lab ZAO) C:\Users\Dee\Downloads\tdsskiller.exe
2014-12-13 06:15 - 2014-12-13 06:15 - 00000000 ____D () C:\Users\Dee\AppData\Roaming\Roxio Log Files
2014-12-11 12:05 - 2014-12-13 14:03 - 00000000 ____D () C:\Windows\erdnt
2014-12-09 17:13 - 2014-11-26 17:43 - 00389296 _____ (Microsoft Corporation) C:\Windows\system32\iedkcs32.dll
2014-12-09 17:13 - 2014-11-26 17:10 - 00342200 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iedkcs32.dll
2014-12-09 17:13 - 2014-11-21 19:06 - 02724864 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.tlb
2014-12-09 17:13 - 2014-11-21 19:06 - 00004096 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollectorres.dll
2014-12-09 17:13 - 2014-11-21 18:50 - 00066560 _____ (Microsoft Corporation) C:\Windows\system32\iesetup.dll
2014-12-09 17:13 - 2014-11-21 18:49 - 00048640 _____ (Microsoft Corporation) C:\Windows\system32\ieetwproxystub.dll
2014-12-09 17:13 - 2014-11-21 18:40 - 00034304 _____ (Microsoft Corporation) C:\Windows\system32\iernonce.dll
2014-12-09 17:13 - 2014-11-21 18:35 - 00114688 _____ (Microsoft Corporation) C:\Windows\system32\ieetwcollector.exe
2014-12-09 17:13 - 2014-11-21 18:26 - 00968704 _____ (Microsoft Corporation) C:\Windows\system32\MsSpellCheckingFacility.exe
2014-12-09 17:13 - 2014-11-21 18:22 - 19749376 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2014-12-09 17:13 - 2014-11-21 18:20 - 02724864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2014-12-09 17:13 - 2014-11-21 18:14 - 00077824 _____ (Microsoft Corporation) C:\Windows\system32\JavaScriptCollectionAgent.dll
2014-12-09 17:13 - 2014-11-21 18:07 - 00062464 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2014-12-09 17:13 - 2014-11-21 18:06 - 00047616 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieetwproxystub.dll
2014-12-09 17:13 - 2014-11-21 18:05 - 00316928 _____ (Microsoft Corporation) C:\Windows\system32\dxtrans.dll
2014-12-09 17:13 - 2014-11-21 18:01 - 02277888 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2014-12-09 17:13 - 2014-11-21 17:59 - 00047104 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2014-12-09 17:13 - 2014-11-21 17:58 - 00030720 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2014-12-09 17:13 - 2014-11-21 17:56 - 00478208 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2014-12-09 17:13 - 2014-11-21 17:55 - 00115712 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieUnatt.exe
2014-12-09 17:13 - 2014-11-21 17:54 - 00620032 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9diag.dll
2014-12-09 17:13 - 2014-11-21 17:49 - 00800768 _____ (Microsoft Corporation) C:\Windows\system32\msfeeds.dll
2014-12-09 17:13 - 2014-11-21 17:49 - 00718848 _____ (Microsoft Corporation) C:\Windows\system32\ie4uinit.exe
2014-12-09 17:13 - 2014-11-21 17:46 - 02125312 _____ (Microsoft Corporation) C:\Windows\system32\inetcpl.cpl
2014-12-09 17:13 - 2014-11-21 17:45 - 00418304 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtmsft.dll
2014-12-09 17:13 - 2014-11-21 17:40 - 00060416 _____ (Microsoft Corporation) C:\Windows\SysWOW64\JavaScriptCollectionAgent.dll
2014-12-09 17:13 - 2014-11-21 17:35 - 00076288 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmled.dll
2014-12-09 17:13 - 2014-11-21 17:33 - 00285696 _____ (Microsoft Corporation) C:\Windows\SysWOW64\dxtrans.dll
2014-12-09 17:13 - 2014-11-21 17:23 - 00688640 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2014-12-09 17:13 - 2014-11-21 17:22 - 02052096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\inetcpl.cpl
2014-12-09 17:13 - 2014-11-21 17:15 - 01548288 _____ (Microsoft Corporation) C:\Windows\system32\urlmon.dll
2014-12-09 17:13 - 2014-11-21 17:13 - 12836864 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2014-12-09 17:13 - 2014-11-21 17:03 - 00800768 _____ (Microsoft Corporation) C:\Windows\system32\ieapfltr.dll
2014-12-09 17:13 - 2014-11-21 16:56 - 01307136 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2014-12-09 17:13 - 2014-11-21 16:54 - 00710144 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieapfltr.dll
2014-12-09 17:12 - 2014-11-21 19:13 - 25059840 _____ (Microsoft Corporation) C:\Windows\system32\mshtml.dll
2014-12-09 17:12 - 2014-11-21 18:50 - 00580096 _____ (Microsoft Corporation) C:\Windows\system32\vbscript.dll
2014-12-09 17:12 - 2014-11-21 18:49 - 02885120 _____ (Microsoft Corporation) C:\Windows\system32\iertutil.dll
2014-12-09 17:12 - 2014-11-21 18:48 - 00088064 _____ (Microsoft Corporation) C:\Windows\system32\MshtmlDac.dll
2014-12-09 17:12 - 2014-11-21 18:41 - 00054784 _____ (Microsoft Corporation) C:\Windows\system32\jsproxy.dll
2014-12-09 17:12 - 2014-11-21 18:37 - 00633856 _____ (Microsoft Corporation) C:\Windows\system32\ieui.dll
2014-12-09 17:12 - 2014-11-21 18:35 - 00144384 _____ (Microsoft Corporation) C:\Windows\system32\ieUnatt.exe
2014-12-09 17:12 - 2014-11-21 18:34 - 06039552 _____ (Microsoft Corporation) C:\Windows\system32\jscript9.dll
2014-12-09 17:12 - 2014-11-21 18:34 - 00814080 _____ (Microsoft Corporation) C:\Windows\system32\jscript9diag.dll
2014-12-09 17:12 - 2014-11-21 18:22 - 00490496 _____ (Microsoft Corporation) C:\Windows\system32\dxtmsft.dll
2014-12-09 17:12 - 2014-11-21 18:09 - 00199680 _____ (Microsoft Corporation) C:\Windows\system32\msrating.dll
2014-12-09 17:12 - 2014-11-21 18:08 - 00092160 _____ (Microsoft Corporation) C:\Windows\system32\mshtmled.dll
2014-12-09 17:12 - 2014-11-21 18:07 - 00501248 _____ (Microsoft Corporation) C:\Windows\SysWOW64\vbscript.dll
2014-12-09 17:12 - 2014-11-21 18:05 - 00064000 _____ (Microsoft Corporation) C:\Windows\SysWOW64\MshtmlDac.dll
2014-12-09 17:12 - 2014-11-21 17:47 - 01359360 _____ (Microsoft Corporation) C:\Windows\system32\mshtmlmedia.dll
2014-12-09 17:12 - 2014-11-21 17:43 - 14412800 _____ (Microsoft Corporation) C:\Windows\system32\ieframe.dll
2014-12-09 17:12 - 2014-11-21 17:36 - 00168960 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msrating.dll
2014-12-09 17:12 - 2014-11-21 17:29 - 04299264 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2014-12-09 17:12 - 2014-11-21 17:28 - 02358272 _____ (Microsoft Corporation) C:\Windows\system32\wininet.dll
2014-12-09 17:12 - 2014-11-21 17:21 - 01155072 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtmlmedia.dll
2014-12-09 17:12 - 2014-11-21 17:00 - 01888256 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2014-12-09 17:10 - 2014-11-10 19:09 - 01424384 _____ (Microsoft Corporation) C:\Windows\system32\WindowsCodecs.dll
2014-12-09 17:10 - 2014-11-10 18:44 - 01230336 _____ (Microsoft Corporation) C:\Windows\SysWOW64\WindowsCodecs.dll
2014-12-08 18:24 - 2014-12-13 17:50 - 00035064 _____ () C:\Windows\system32\Drivers\TrueSight.sys
2014-12-03 06:37 - 2014-12-03 06:37 - 00001047 _____ () C:\Users\Dee\Desktop\Machinarium-demo.lnk
2014-12-03 06:37 - 2014-12-03 06:37 - 00000000 ____D () C:\Users\Dee\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Machinarium
2014-12-03 06:37 - 2014-12-03 06:37 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Machinarium
2014-12-03 06:37 - 2014-12-03 06:37 - 00000000 ____D () C:\Program Files (x86)\Machinarium
2014-12-03 06:35 - 2014-12-03 06:35 - 00001030 _____ () C:\Users\Public\Desktop\Motor Town.lnk
2014-12-03 06:35 - 2014-12-03 06:35 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Motor Town
2014-12-03 06:35 - 2014-12-03 06:35 - 00000000 ____D () C:\Program Files (x86)\Motor Town
2014-12-02 21:49 - 2014-12-02 21:49 - 00000000 ____D () C:\Users\Dee\Documents\8floor
2014-12-02 21:20 - 2014-12-02 21:20 - 00000000 ____D () C:\Users\Public\Documents\Ghost Master
2014-12-02 14:02 - 2014-12-02 14:02 - 00000000 ____D () C:\Users\Dee\Documents\Telltale Games
2014-12-02 13:37 - 2014-12-02 13:39 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Thomas Was Alone
2014-12-02 13:36 - 2014-12-02 13:36 - 00001821 _____ () C:\Users\Dee\Desktop\Thomas Was Alone.lnk
2014-12-02 13:35 - 2014-12-03 00:21 - 00000000 ____D () C:\Program Files (x86)\Thomas Was Alone
2014-12-02 13:32 - 2014-12-02 13:32 - 00001381 _____ () C:\Users\Public\Desktop\Puzzle Agent.lnk
2014-12-02 13:27 - 2014-12-02 13:27 - 00000000 ____D () C:\Windows\SysWOW64\directx
2014-12-02 13:27 - 2009-03-16 14:18 - 00517448 _____ (Microsoft Corporation) C:\Windows\SysWOW64\XAudio2_4.dll
2014-12-02 13:27 - 2009-03-16 14:18 - 00022360 _____ (Microsoft Corporation) C:\Windows\SysWOW64\X3DAudio1_6.dll
2014-12-02 13:27 - 2009-03-09 15:27 - 04178264 _____ (Microsoft Corporation) C:\Windows\SysWOW64\D3DX9_41.dll
2014-12-02 13:27 - 2007-04-04 18:53 - 00081768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\xinput1_3.dll
2014-12-02 13:27 - 2006-07-28 09:30 - 00062744 _____ (Microsoft Corporation) C:\Windows\SysWOW64\xinput1_2.dll
2014-12-02 13:27 - 2006-03-31 12:39 - 00062672 _____ (Microsoft Corporation) C:\Windows\SysWOW64\xinput1_1.dll
2014-12-02 13:27 - 2005-07-22 19:59 - 02319568 _____ (Microsoft Corporation) C:\Windows\SysWOW64\d3dx9_27.dll
2014-12-02 13:26 - 2014-12-02 13:26 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Telltale Games
2014-12-02 13:26 - 2014-12-02 13:26 - 00000000 ____D () C:\Program Files (x86)\Telltale Games
2014-12-02 13:08 - 2014-12-02 13:08 - 00001264 _____ () C:\Users\Dee\Desktop\Christmas Mahjong.lnk
2014-12-01 20:34 - 2014-12-01 20:34 - 00000000 ____D () C:\Users\Dee\AppData\Roaming\Total Eclipse
2014-12-01 04:12 - 2014-12-01 04:12 - 00000000 __SHD () C:\Users\Dee\AppData\Local\EmieBrowserModeList
2014-12-01 03:47 - 2014-12-01 03:47 - 00000000 ____D () C:\Users\Dee\Documents\Atari
2014-12-01 03:43 - 2014-12-01 03:43 - 00002238 _____ () C:\Users\Public\Desktop\Puzzler World.lnk
2014-12-01 03:29 - 2014-12-01 03:29 - 00001020 _____ () C:\Users\Dee\Desktop\Ghost Master.lnk
2014-12-01 03:26 - 2014-12-12 23:49 - 00000000 ____D () C:\Program Files (x86)\Ghost Master
2014-12-01 03:02 - 2014-12-01 03:02 - 00001262 _____ () C:\Users\Dee\Desktop\The Clockwork Man - The Hidden World.lnk
2014-12-01 03:01 - 2014-12-12 21:44 - 00000000 ____D () C:\Program Files (x86)\The Clockwork Man - The Hidden World
2014-12-01 02:42 - 2014-12-15 09:00 - 00000000 ____D () C:\Program Files (x86)\PAC-MAN
2014-12-01 02:42 - 2014-12-01 02:42 - 00000990 _____ () C:\Users\Dee\Desktop\PAC-MAN.lnk
2014-12-01 02:24 - 2014-12-01 02:24 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\LibreOffice 4.3
2014-12-01 02:23 - 2014-12-01 02:24 - 00000000 ____D () C:\Program Files (x86)\LibreOffice 4
2014-11-18 22:57 - 2014-11-10 19:08 - 00728064 _____ (Microsoft Corporation) C:\Windows\system32\kerberos.dll
2014-11-18 22:57 - 2014-11-10 19:08 - 00241152 _____ (Microsoft Corporation) C:\Windows\system32\pku2u.dll
2014-11-18 22:57 - 2014-11-10 18:44 - 00550912 _____ (Microsoft Corporation) C:\Windows\SysWOW64\kerberos.dll
2014-11-18 22:57 - 2014-11-10 18:44 - 00186880 _____ (Microsoft Corporation) C:\Windows\SysWOW64\pku2u.dll

==================== One Month Modified Files and Folders =======

(If an entry is included in the fixlist, the file\folder will be moved.)

2014-12-16 12:13 - 2012-10-10 23:58 - 00000830 _____ () C:\Windows\Tasks\Adobe Flash Player Updater.job
2014-12-16 11:57 - 2011-10-17 20:54 - 01809872 _____ () C:\Windows\WindowsUpdate.log
2014-12-16 11:32 - 2014-04-05 08:45 - 00129752 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\MBAMSwissArmy.sys
2014-12-16 11:24 - 2009-07-13 20:45 - 00032064 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2014-12-16 11:24 - 2009-07-13 20:45 - 00032064 ____H () C:\Windows\system32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2014-12-16 11:16 - 2009-07-13 21:08 - 00000006 ____H () C:\Windows\Tasks\SA.DAT
2014-12-16 11:16 - 2009-07-13 20:51 - 00135428 _____ () C:\Windows\setupact.log
2014-12-15 21:47 - 2014-09-16 10:04 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Exploit
2014-12-15 21:47 - 2014-09-16 10:04 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Exploit
2014-12-15 10:15 - 2014-09-16 10:04 - 00000000 ____D () C:\ProgramData\Malwarebytes Anti-Exploit
2014-12-15 00:27 - 2012-12-22 19:28 - 00000000 ____D () C:\Program Files (x86)\Burger Shop 2
2014-12-14 14:48 - 2012-03-16 21:11 - 00000000 ____D () C:\Users\Dee\Documents\My Files
2014-12-14 10:06 - 2014-04-05 08:44 - 00096472 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbamchameleon.sys
2014-12-14 09:52 - 2012-03-08 19:51 - 00000000 ____D () C:\Users\Dee
2014-12-13 07:13 - 2012-10-10 23:58 - 00003768 _____ () C:\Windows\System32\Tasks\Adobe Flash Player Updater
2014-12-13 07:13 - 2012-03-29 18:36 - 00701104 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2014-12-13 07:13 - 2011-07-15 21:37 - 00071344 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2014-12-13 06:42 - 2012-10-12 18:42 - 00000000 ____D () C:\Program Files (x86)\Mozilla Firefox
2014-12-13 06:42 - 2012-03-17 21:08 - 00001163 _____ () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Mozilla Firefox.lnk
2014-12-13 06:34 - 2014-09-09 10:05 - 00000000 ____D () C:\Users\Dee\AppData\Local\Adobe
2014-12-13 06:16 - 2011-07-15 21:33 - 00000000 ____D () C:\Program Files (x86)\Hewlett-Packard
2014-12-13 06:14 - 2011-07-15 21:38 - 00000000 ___RD () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Productivity and Tools
2014-12-12 00:19 - 2013-02-20 20:14 - 00000000 ____D () C:\Users\Dee\Desktop\My Games
2014-12-11 18:31 - 2013-11-25 22:37 - 00000000 ____D () C:\Program Files (x86)\Zenerchi
2014-12-11 12:23 - 2010-11-20 19:47 - 00780642 _____ () C:\Windows\PFRO.log
2014-12-11 12:13 - 2009-07-13 18:34 - 00000215 _____ () C:\Windows\system.ini
2014-12-09 23:20 - 2012-10-06 23:42 - 00000000 ____D () C:\Program Files (x86)\7 Wonders 4 - Magical Mystery Tour
2014-12-09 20:32 - 2012-09-25 23:04 - 00000000 ____D () C:\Program Files (x86)\Mah Jong Medley
2014-12-09 18:50 - 2009-07-13 19:20 - 00000000 ____D () C:\Windows\rescache
2014-12-09 17:18 - 2013-07-09 10:51 - 00000000 ____D () C:\Windows\system32\MRT
2014-12-09 17:18 - 2009-07-13 19:20 - 00000000 ____D () C:\Windows\PolicyDefinitions
2014-12-09 17:14 - 2012-03-17 20:44 - 112710672 _____ (Microsoft Corporation) C:\Windows\system32\MRT.exe
2014-12-08 04:47 - 2009-07-13 19:20 - 00000000 ____D () C:\Windows\Registration
2014-12-04 11:55 - 2014-04-05 08:44 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Malwarebytes Anti-Malware
2014-12-04 11:55 - 2014-04-05 08:44 - 00000000 ____D () C:\Program Files (x86)\Malwarebytes Anti-Malware
2014-12-03 23:31 - 2012-10-06 23:29 - 00000000 ____D () C:\Program Files (x86)\Cubis Gold 2
2014-12-03 23:16 - 2013-03-31 00:42 - 00000000 ____D () C:\Users\Dee\AppData\Roaming\AlawarEntertainment
2014-12-02 21:21 - 2012-09-25 23:14 - 00000000 ____D () C:\Program Files (x86)\Hotdog Hotshot
2014-12-02 13:08 - 2014-08-29 06:30 - 00000000 ____D () C:\Users\Dee\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Viva Media
2014-12-02 13:08 - 2014-08-29 06:29 - 00000000 ____D () C:\Program Files (x86)\Viva Media
2014-12-01 10:06 - 2009-07-13 20:45 - 00313536 _____ () C:\Windows\system32\FNTCACHE.DAT
2014-12-01 03:59 - 2012-03-08 19:58 - 00069832 _____ () C:\Users\Dee\AppData\Local\GDIPFONTCACHEV1.DAT
2014-12-01 03:57 - 2009-07-13 21:13 - 00713888 _____ () C:\Windows\system32\PerfStringBackup.INI
2014-12-01 03:43 - 2013-04-21 23:13 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Atari
2014-12-01 03:43 - 2013-04-21 23:13 - 00000000 ____D () C:\Program Files (x86)\Atari
2014-12-01 03:29 - 2012-08-31 10:56 - 00000000 ____D () C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Amazon Games
2014-12-01 03:25 - 2012-08-31 10:55 - 00000000 ____D () C:\Users\Public\Documents\Amazon Games & Software
2014-11-30 21:40 - 2013-05-13 01:50 - 00000000 ____D () C:\Program Files (x86)\Hidden object bundle 10in1
2014-11-30 21:14 - 2014-03-06 09:35 - 00000000 ____D () C:\Program Files (x86)\The Lake House Children of Silence
2014-11-30 21:12 - 2013-08-10 19:58 - 00000000 ____D () C:\Program Files (x86)\Nancy Drew The Phantom of Venice
2014-11-29 15:34 - 2013-11-25 20:40 - 00000000 ____D () C:\Program Files (x86)\Diner Dash 5 Boom!
2014-11-29 15:20 - 2012-12-09 21:16 - 00000000 ____D () C:\Program Files (x86)\7 Wonders Ancient Alien Makeover
2014-11-25 19:59 - 2013-03-31 00:40 - 00000000 ____D () C:\Program Files (x86)\House of 1000 Doors - Family Secrets
2014-11-21 06:14 - 2014-04-05 08:44 - 00063704 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mwac.sys
2014-11-21 06:14 - 2014-04-05 08:44 - 00025816 _____ (Malwarebytes Corporation) C:\Windows\system32\Drivers\mbam.sys
2014-11-18 00:03 - 2012-03-30 20:21 - 00003174 _____ () C:\Windows\System32\Tasks\HPCeeScheduleForDee
2014-11-18 00:03 - 2012-03-30 20:21 - 00000324 _____ () C:\Windows\Tasks\HPCeeScheduleForDee.job

Some content of TEMP:
====================
C:\Users\Dee\AppData\Local\Temp\dllnt_dump.dll


==================== Bamital & volsnap Check =================

(There is no automatic fix for files that do not pass verification.)

C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\SysWOW64\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed


LastRegBack: 2014-12-15 09:47

==================== End Of Log ============================

Attached Files


Edited by nasdaq, 17 December 2014 - 09:18 AM.


#6 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:01 AM

Posted 17 December 2014 - 09:25 AM



Open notepad (Start =>All Programs => Accessories => Notepad). Please copy the entire contents of the code box below.


start

HKLM-x32\...\Run: [] => [X]
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\S-1-5-21-2807582641-1589491884-1559589272-1000\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
SearchScopes: HKLM -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKLM-x32 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKLM-x32 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> DefaultScope {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL = http://www.bing.com/search?q={searchTerms}&form=HPNTDF&pc=HPNTDF&src=IE-SearchBox
SearchScopes: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> {2fa28606-de77-4029-af96-b231e3b8f827} URL = http://search.ask.com/web?q={searchterms}&l=dis&o=HPNTDF
Toolbar: HKU\S-1-5-21-2807582641-1589491884-1559589272-1000 -> No Name - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - No File
FF Plugin: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @microsoft.com/GENUINE -> disabled No File
FF Plugin-x32: @oberon-media.com/ONCAdapter -> C:\Program Files (x86)\Common Files\Oberon Media\NCAdapter\1.0.0.8\npapicomadapter.dll No File
FF SearchPlugin: C:\Users\Dee\AppData\Roaming\Mozilla\Firefox\Profiles\rt6u0iph.default\searchplugins\startpage-search-engine.xml
S3 catchme; \??\C:\ComboFix\catchme.sys [X]
S3 clwvd; system32\DRIVERS\clwvd.sys [X]
AlternateDataStreams: C:\ProgramData\Temp:C5B78274

End
Save the files as fixlist.txt into the same folder as FRST

Run FRST and click Fix only once and wait.

Restart the computer normally to reset the registry.

The tool will create a log (Fixlog.txt) please post it to your reply.
===

Download Security Check by screen317 from here
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.
p.s.
If the SecurityCheck program fails to run for any reason, run it as an Administrator.

If the site is busy or not available use this mirror site:
http://www.bleepingcomputer.com/download/securitycheck/

How is the computer running now?

======

#7 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:01 AM

Posted 23 December 2014 - 10:16 AM

If all is well.

To learn more about how to protect yourself while on the internet read this little guide Best security practices Keep safe.
http://www.bleepingcomputer.com/forums/t/407147/answers-to-common-security-questions-best-practices/
===

#8 nasdaq

nasdaq

  • Malware Response Team
  • 38,223 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:06:01 AM

Posted 29 December 2014 - 09:57 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users