Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Svchost.exe (claymore cryptonote CPU miner 3.3)


  • This topic is locked This topic is locked
12 replies to this topic

#1 Fluens

Fluens

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:33 PM

Posted 13 June 2015 - 01:04 AM

Hello, I currently am having a tough time removing this virus, it just keeps reappearing on restart.

Would greatly appreciate it if someone with experience could help me out with it.

The process is hovering on around 60% of CPU and it located in the temp folder.

 

Cheers, Fluens.

 

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version:08-06-2015
Ran by User (administrator) on FLUENS on 13-06-2015 15:59:04
Running from C:\Users\User\Downloads
Loaded Profiles: User (Available Profiles: User)
Platform: Windows 8.1 (X64) OS Language: English (United Kingdom)
Internet Explorer Version 11 (Default browser: Chrome)
Boot Mode: Normal
 
==================== Processes (Whitelisted) =================
 
(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)
 
(AMD) C:\Windows\System32\atiesrxx.exe
(AMD) C:\Windows\System32\atieclxx.exe
(Microsoft Corporation) C:\Windows\System32\dasHost.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\MsMpEng.exe
(Microsoft Corporation) C:\Program Files\Windows Defender\NisSrv.exe
(Microsoft Corporation) C:\Windows\System32\wscript.exe
(Microsoft Corporation) C:\Program Files\Microsoft Mouse and Keyboard Center\itype.exe
(Microsoft Corporation) C:\Program Files\Microsoft Mouse and Keyboard Center\ipoint.exe
(Microsoft Corporation) C:\Windows\System32\InputMethod\JPN\JpnIME.exe
(Microsoft Corporation) C:\Windows\System32\schtasks.exe
(Microsoft Corporation) C:\Program Files\Microsoft Xbox 360 Accessories\XBoxStat.exe
(Adobe Systems Incorporated) C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe
(Microsoft Corporation) C:\Windows\System32\GWX\GWX.exe
(Disc Soft Ltd) C:\Program Files (x86)\DAEMON Tools Ultra\DiscSoftBusService.exe
() C:\ProgramData\{3ae7d3bd-dec2-d72f-3ae7-7d3bddec4ef7}\microsoft-word-2013.exe
(Valve Corporation) E:\Steam\Steam.exe
(Valve Corporation) E:\Steam\bin\steamwebhelper.exe
(Valve Corporation) C:\Program Files (x86)\Common Files\Steam\SteamService.exe
(Valve Corporation) E:\Steam\bin\steamwebhelper.exe
() C:\Windows\Temp\svchost.exe
(Microsoft Corporation) C:\Windows\System32\Taskmgr.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
(Google Inc.) C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
 
 
==================== Registry (Whitelisted) ==================
 
(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)
 
HKLM\...\Run: [XboxStat] => C:\Program Files\Microsoft Xbox 360 Accessories\XboxStat.exe [825184 2009-09-30] (Microsoft Corporation)
HKLM-x32\...\Run: [Adobe ARM] => C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [959904 2013-11-22] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [VirtualCloneDrive] => C:\Program Files (x86)\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe [88984 2013-03-11] (Elaborate Bytes AG)
HKLM-x32\...\Run: [Raptr] => C:\Program Files (x86)\Raptr\raptrstub.exe [55568 2015-05-05] (Raptr, Inc)
HKLM-x32\...\Run: [BCSSync] => E:\Office14\BCSSync.exe [91520 2010-01-21] (Microsoft Corporation)
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\Run: [Steam] => E:\Steam\Steam.exe [2892992 2015-06-05] (Valve Corporation)
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\Run: [uTorrent] => C:\Users\User\AppData\Roaming\uTorrent\uTorrent.exe [1694560 2015-05-07] (BitTorrent Inc.)
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\Run: [Plex Media Server] => C:\Program Files (x86)\Plex\Plex Media Server\Plex Media Server.exe [4014760 2013-04-03] (Plex, Inc.)
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\Run: [DAEMON Tools Ultra Agent] => C:\Program Files (x86)\DAEMON Tools Ultra\DTAgent.exe [3639568 2014-07-10] (Disc Soft Ltd)
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\Run: [CCleaner Monitoring] => C:\Program Files\CCleaner\CCleaner64.exe [6501656 2014-10-31] (Piriform Ltd)
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\MountPoints2: {7202bd08-15af-11e4-beb2-50465dabf302} - "I:\setup.exe" 
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\MountPoints2: {7f40dc3c-0820-11e4-beb0-50465dabf302} - "H:\setup.exe" 
Startup: C:\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Curse.lnk [2015-05-29]
ShortcutTarget: Curse.lnk -> C:\Users\User\AppData\Roaming\Curse Client\Bin\Curse.exe (Curse, Inc)
Startup: C:\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CurseClientStartup.ccip [2015-05-29] ()
Startup: C:\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\microsoft-word-2013.lnk [2015-05-01]
ShortcutTarget: microsoft-word-2013.lnk -> C:\ProgramData\{3ae7d3bd-dec2-d72f-3ae7-7d3bddec4ef7}\microsoft-word-2013.exe ()
ShellIconOverlayIdentifiers-x32: [Groove Explorer Icon Overlay 1 (GFS Unread Stub)] -> {99FD978C-D287-4F50-827F-B2C658EDA8E7} => E:\Office14\GROOVEEX.DLL [2010-01-21] (Microsoft Corporation)
ShellIconOverlayIdentifiers-x32: [Groove Explorer Icon Overlay 2 (GFS Stub)] -> {AB5C5600-7E6E-4B06-9197-9ECEF74D31CC} => E:\Office14\GROOVEEX.DLL [2010-01-21] (Microsoft Corporation)
ShellIconOverlayIdentifiers-x32: [Groove Explorer Icon Overlay 2.5 (GFS Unread Folder)] -> {920E6DB1-9907-4370-B3A0-BAFC03D81399} => E:\Office14\GROOVEEX.DLL [2010-01-21] (Microsoft Corporation)
ShellIconOverlayIdentifiers-x32: [Groove Explorer Icon Overlay 3 (GFS Folder)] -> {16F3DD56-1AF5-4347-846D-7C10C4192619} => E:\Office14\GROOVEEX.DLL [2010-01-21] (Microsoft Corporation)
ShellIconOverlayIdentifiers-x32: [Groove Explorer Icon Overlay 4 (GFS Unread Mark)] -> {2916C86E-86A6-43FE-8112-43ABE6BF8DCC} => E:\Office14\GROOVEEX.DLL [2010-01-21] (Microsoft Corporation)
CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION
 
==================== Internet (Whitelisted) ====================
 
(If an item is included in the fixlist, if it is a registry item it will be removed or restored to default.)
 
HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = www.google.com
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Start Page = www.google.com
HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = www.google.com
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Search Page = www.google.com
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = www.google.com
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Page_URL = www.google.com
HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = www.google.com
HKLM\Software\Wow6432Node\Microsoft\Internet Explorer\Main,Default_Search_URL = www.google.com
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Microsoft\Internet Explorer\Main,Start Page Redirect Cache = http://ninemsn.com.au/?ocid=iehp
BHO-x32: Office Document Cache Handler -> {B4F3A835-0E21-4959-BA22-42B3008E02FF} -> E:\Office14\URLREDIR.DLL [2010-01-16] (Microsoft Corporation)
Hosts: There are more than one entry in Hosts. See Hosts section of Addition.txt
Tcpip\Parameters: [DhcpNameServer] 192.168.1.1
Tcpip\..\Interfaces\{E00E1C1A-2D81-4798-BCBA-B63E6B188636}: [NameServer] 8.8.8.8,8.8.4.4
StartMenuInternet: IEXPLORE.EXE - iexplore.exe
 
FireFox:
========
FF ProfilePath: C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740
FF Plugin: @adobe.com/FlashPlayer -> C:\WINDOWS\system32\Macromed\Flash\NPSWF64_17_0_0_188.dll [2015-06-10] ()
FF Plugin: @java.com/DTPlugin,version=10.71.2 -> C:\Program Files\Java\jre7\bin\dtplugin\npDeployJava1.dll [2014-11-04] (Oracle Corporation)
FF Plugin: @java.com/JavaPlugin,version=10.71.2 -> C:\Program Files\Java\jre7\bin\plugin2\npjp2.dll [2014-11-04] (Oracle Corporation)
FF Plugin: @microsoft.com/OfficeAuthz,version=14.0 -> C:\PROGRA~1\MICROS~3\Office14\NPAUTHZ.DLL [2010-01-09] (Microsoft Corporation)
FF Plugin-x32: @adobe.com/FlashPlayer -> C:\WINDOWS\SysWOW64\Macromed\Flash\NPSWF32_17_0_0_188.dll [2015-06-10] ()
FF Plugin-x32: @java.com/DTPlugin,version=1.6.0_43 -> C:\WINDOWS\SysWOW64\npdeployJava1.dll [2015-01-29] (Sun Microsystems, Inc.)
FF Plugin-x32: @java.com/JavaPlugin -> C:\Program Files (x86)\Java\jre6\bin\plugin2\npjp2.dll [2015-01-29] (Sun Microsystems, Inc.)
FF Plugin-x32: @microsoft.com/OfficeAuthz,version=14.0 -> E:\Office14\NPAUTHZ.DLL [2010-01-09] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/SharePoint,version=14.0 -> E:\Office14\NPSPWRAP.DLL [2010-01-10] (Microsoft Corporation)
FF Plugin-x32: @microsoft.com/WLPG,version=16.4.3505.0912 -> C:\Program Files (x86)\Windows Live\Photo Gallery\NPWLPG.dll [2012-09-12] (Microsoft Corporation)
FF Plugin-x32: @nexon.net/NxGame -> C:\ProgramData\NexonUS\NGM\npNxGameUS.dll [2014-01-16] (Nexon)
FF Plugin-x32: @pandonetworks.com/PandoWebPlugin -> C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll [2013-12-12] (Pando Networks)
FF Plugin-x32: @tools.google.com/Google Update;version=3 -> C:\Program Files (x86)\Google\Update\1.3.27.5\npGoogleUpdate3.dll [2015-05-15] (Google Inc.)
FF Plugin-x32: @tools.google.com/Google Update;version=9 -> C:\Program Files (x86)\Google\Update\1.3.27.5\npGoogleUpdate3.dll [2015-05-15] (Google Inc.)
FF Plugin-x32: @videolan.org/vlc,version=2.0.5 -> C:\Program Files (x86)\VideoLAN\VLC\npvlc.dll [2012-12-13] (VideoLAN)
FF Plugin-x32: Adobe Reader -> C:\Program Files (x86)\Adobe\Reader 11.0\Reader\AIR\nppdf32.dll [2014-05-08] (Adobe Systems Inc.)
FF Plugin HKU\S-1-5-21-558910080-3827423310-2547630886-1001: @unity3d.com/UnityPlayer,version=1.0 -> C:\Users\User\AppData\LocalLow\Unity\WebPlayer\loader\npUnity3D32.dll [2014-11-30] (Unity Technologies ApS)
FF Plugin HKU\S-1-5-21-558910080-3827423310-2547630886-1001: pandonetworks.com/PandoWebPlugin -> C:\Program Files (x86)\Pando Networks\Media Booster\npPandoWebPlugin.dll [2013-12-12] (Pando Networks)
FF Plugin HKU\S-1-5-21-558910080-3827423310-2547630886-1001: ubisoft.com/uplaypc -> C:\Program Files (x86)\Ubisoft\Ubisoft Game Launcher\npuplaypc.dll [2015-02-20] ()
FF Extension: YouTube Video and Audio Downloader - C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\Extensions\feca4b87-3be4-43da-a1b1-137c24220968@jetpack.xpi [2013-09-03]
FF Extension: SaveFrom.net helper - C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\Extensions\helper@savefrom.net.xpi [2015-04-08]
FF Extension: Personas Plus - C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\Extensions\personas@christopher.beard.xpi [2013-07-29]
FF Extension: Adblock Plus - C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\Extensions\{d10d0bf8-f5b5-c8b4-a8b2-2b9879e08c5d}.xpi [2013-07-29]
FF Extension: DownThemAll! - C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\Extensions\{DDC359D1-844A-42a7-9AA1-88A850A938A8}.xpi [2013-07-29]
FF Extension: Java Console - C:\Program Files (x86)\Mozilla Firefox\extensions\{CAFEEFAC-0016-0000-0043-ABCDEFFEDCBA} [2015-01-29]
FF Extension: No Name - C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\extensions\searchffv2@gmail.com [not found]
 
Chrome: 
=======
CHR Profile: C:\Users\User\AppData\Local\Google\Chrome\User Data\Default
CHR Extension: (Google Docs) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2014-02-07]
CHR Extension: (Google Drive) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2014-02-07]
CHR Extension: (MEGA) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\bigefpfhnfcobdlfbedofhhaibnlghod [2014-10-12]
CHR Extension: (YouTube) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2014-02-07]
CHR Extension: (Sad Panda) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\bohapeiooecafommnlaiccilacgmkaoc [2014-09-19]
CHR Extension: (Adblock Plus) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\cfhdojbkjhnklbpkdaibdccddilifddb [2014-02-07]
CHR Extension: (Image Downloader) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\cnpniohnfphhjihaiiggeabnkjhpaldj [2014-02-08]
CHR Extension: (Google Search) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\coobgpohoikkiipiblmjeljniedjpjpf [2014-02-07]
CHR Extension: (Vocaloid theme) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\hllhaamebpkddllheheppdiohkdlgmgc [2014-02-07]
CHR Extension: (Chrome Hotword Shared Module) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\lccekmodgklaepjeofjdjpbminllajkg [2015-03-14]
CHR Extension: (Ghostery) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\mlomiejdfkolichcflejclcbmpeaniij [2014-10-03]
CHR Extension: (Google Wallet) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2014-02-07]
CHR Extension: (Gmail) - C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2014-02-07]
 
==================== Services (Whitelisted) =================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
S3 BthHFSrv; C:\Windows\System32\BthHFSrv.dll [324608 2014-10-29] (Microsoft Corporation)
R3 Disc Soft Bus Service; C:\Program Files (x86)\DAEMON Tools Ultra\DiscSoftBusService.exe [887056 2014-07-10] (Disc Soft Ltd)
S2 MBAMService; C:\Program Files (x86)\Malwarebytes Anti-Malware\mbamservice.exe [1080120 2015-04-14] (Malwarebytes Corporation)
S3 Microsoft SharePoint Workspace Audit Service; E:\Office14\GROOVE.EXE [30963576 2010-01-21] (Microsoft Corporation)
S3 npggsvc; C:\WINDOWS\SysWOW64\GameMon.des [5307800 2013-11-18] (INCA Internet Co., Ltd.)
R3 WdNisSvc; C:\Program Files\Windows Defender\NisSrv.exe [366520 2015-02-04] (Microsoft Corporation)
R2 WinDefend; C:\Program Files\Windows Defender\MsMpEng.exe [23792 2015-02-04] (Microsoft Corporation)
 
==================== Drivers (Whitelisted) ====================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
S0 amdkmafd; C:\Windows\System32\drivers\amdkmafd.sys [21160 2012-09-23] (Advanced Micro Devices, Inc.)
R3 AtiHDAudioService; C:\Windows\system32\drivers\AtihdW86.sys [129536 2013-07-05] (Advanced Micro Devices)
S3 AU8168; C:\Windows\system32\DRIVERS\au630x64.sys [792648 2013-09-23] (Realtek                                            )
R3 dtscsibus; C:\Windows\system32\DRIVERS\dtscsibus.sys [29696 2014-11-30] (Disc Soft Ltd)
R3 ManyCam; C:\Windows\system32\DRIVERS\mcvidrv.sys [49776 2014-07-25] (Visicom Media Inc.)
R3 MBAMProtector; C:\WINDOWS\system32\drivers\mbam.sys [25816 2015-04-14] (Malwarebytes Corporation)
S3 MBAMWebAccessControl; C:\WINDOWS\system32\drivers\mwac.sys [64216 2015-04-14] (Malwarebytes Corporation)
R3 mcaudrv_simple; C:\Windows\system32\drivers\mcaudrv_x64.sys [35440 2014-05-13] (Visicom Media Inc.)
R3 TS_ARN5416; C:\Windows\system32\DRIVERS\ts_athrx.sys [3543752 2014-06-20] (TamoSoft)
S3 USBAAPL64; C:\Windows\System32\Drivers\usbaapl64.sys [54784 2012-12-13] (Apple, Inc.) [File not signed]
R3 WdNisDrv; C:\Windows\System32\Drivers\WdNisDrv.sys [114496 2015-02-04] (Microsoft Corporation)
S3 EagleX64; \??\C:\WINDOWS\system32\drivers\EagleX64.sys [X]
 
==================== NetSvcs (Whitelisted) ===================
 
(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)
 
 
==================== One Month Created files and folders ========
 
(If an entry is included in the fixlist, the file/folder will be moved.)
 
2015-06-13 15:59 - 2015-06-13 15:59 - 00016391 _____ C:\Users\User\Downloads\FRST.txt
2015-06-13 15:58 - 2015-06-13 15:59 - 00000000 ____D C:\FRST
2015-06-13 15:58 - 2015-06-13 15:58 - 02108928 _____ (Farbar) C:\Users\User\Downloads\FRST64.exe
2015-06-13 15:41 - 2015-06-13 15:41 - 00000000 ____D C:\Users\User\Downloads\backups
2015-06-13 15:40 - 2015-06-13 15:41 - 00388608 _____ (Trend Micro Inc.) C:\Users\User\Downloads\HijackThis.exe
2015-06-13 15:14 - 2015-06-13 15:15 - 00004358 _____ C:\Users\User\Desktop\Rkill.txt
2015-06-13 15:12 - 2015-06-13 15:12 - 01943800 _____ (Bleeping Computer, LLC) C:\Users\User\Downloads\rkill.exe
2015-06-12 23:45 - 2015-06-12 23:45 - 00014977 _____ C:\Users\User\Downloads\torrentdownload.torrent
2015-06-12 23:44 - 2015-06-12 23:44 - 00055150 _____ C:\Users\User\Downloads\[Coalgirls]_Kampfer_(1280x720_Blu-Ray_FLAC).torrent
2015-06-11 19:29 - 2015-06-11 19:29 - 00104106 _____ C:\Users\User\Downloads\[Coalgirls]_To_Aru_Kagaku_no_Railgun_S_(1280x720_Blu-ray_FLAC).torrent
2015-06-11 19:26 - 2015-06-11 19:26 - 00015664 _____ C:\Users\User\Downloads\[kat.cr]to.aru.kagaku.no.railgun.s.season.2.720p.mhd.torrent
2015-06-10 10:11 - 2015-05-25 23:23 - 00036864 _____ (Microsoft Corporation) C:\WINDOWS\system32\UtcResources.dll
2015-06-10 10:11 - 2015-05-25 23:07 - 01430528 _____ (Microsoft Corporation) C:\WINDOWS\system32\diagtrack.dll
2015-06-10 10:11 - 2015-05-22 23:08 - 00700416 _____ (Microsoft Corporation) C:\WINDOWS\system32\generaltel.dll
2015-06-10 10:11 - 2015-05-21 23:08 - 01119232 _____ (Microsoft Corporation) C:\WINDOWS\system32\aeinv.dll
2015-06-10 10:11 - 2015-05-21 23:08 - 01020928 _____ (Microsoft Corporation) C:\WINDOWS\system32\appraiser.dll
2015-06-10 10:11 - 2015-05-21 23:08 - 00756736 _____ (Microsoft Corporation) C:\WINDOWS\system32\invagent.dll
2015-06-10 10:11 - 2015-05-21 23:08 - 00422912 _____ (Microsoft Corporation) C:\WINDOWS\system32\devinv.dll
2015-06-10 10:11 - 2015-05-21 23:08 - 00193536 _____ (Microsoft Corporation) C:\WINDOWS\system32\aepic.dll
2015-06-10 10:11 - 2015-05-21 23:08 - 00045568 _____ (Microsoft Corporation) C:\WINDOWS\system32\acmigration.dll
2015-06-10 10:11 - 2015-04-17 08:07 - 00227328 _____ (Microsoft Corporation) C:\WINDOWS\system32\aepdu.dll
2015-06-10 10:11 - 2015-04-09 08:41 - 00158720 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rgb9rast.dll
2015-06-10 10:11 - 2015-04-09 08:07 - 00410336 _____ C:\WINDOWS\system32\ApnDatabase.xml
2015-06-10 10:11 - 2015-04-02 08:42 - 03097600 _____ (Microsoft Corporation) C:\WINDOWS\system32\msftedit.dll
2015-06-10 10:11 - 2015-04-02 08:30 - 02483712 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msftedit.dll
2015-06-10 10:11 - 2015-03-20 13:49 - 00309760 _____ (Microsoft Corporation) C:\WINDOWS\system32\compstui.dll
2015-06-10 10:11 - 2015-03-20 13:08 - 00477184 _____ (Microsoft Corporation) C:\WINDOWS\system32\puiobj.dll
2015-06-10 10:11 - 2015-03-20 12:37 - 00367104 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\puiobj.dll
2015-06-10 10:11 - 2015-03-20 12:07 - 01091072 _____ (Microsoft Corporation) C:\WINDOWS\system32\localspl.dll
2015-06-10 10:11 - 2015-03-02 11:43 - 00222208 _____ (Microsoft Corporation) C:\WINDOWS\system32\rastapi.dll
2015-06-10 10:11 - 2015-03-02 11:21 - 00207872 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\rastapi.dll
2015-06-10 10:10 - 2015-05-28 00:35 - 24917504 _____ (Microsoft Corporation) C:\WINDOWS\system32\mshtml.dll
2015-06-10 10:10 - 2015-05-28 00:08 - 19607040 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mshtml.dll
2015-06-10 10:10 - 2015-05-23 13:15 - 00503808 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\vbscript.dll
2015-06-10 10:10 - 2015-05-23 13:14 - 00341504 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\html.iec
2015-06-10 10:10 - 2015-05-23 13:10 - 02278912 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\iertutil.dll
2015-06-10 10:10 - 2015-05-23 13:05 - 00664064 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\jscript.dll
2015-06-10 10:10 - 2015-05-23 13:04 - 00620032 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\jscript9diag.dll
2015-06-10 10:10 - 2015-05-23 12:48 - 00076288 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mshtmled.dll
2015-06-10 10:10 - 2015-05-23 12:47 - 04305920 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\jscript9.dll
2015-06-10 10:10 - 2015-05-23 12:47 - 00285696 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\dxtrans.dll
2015-06-10 10:10 - 2015-05-23 12:47 - 00128000 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\iepeers.dll
2015-06-10 10:10 - 2015-05-23 12:43 - 00880128 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\inetcomm.dll
2015-06-10 10:10 - 2015-05-23 12:38 - 00689152 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\msfeeds.dll
2015-06-10 10:10 - 2015-05-23 12:38 - 00327168 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\iedkcs32.dll
2015-06-10 10:10 - 2015-05-23 12:37 - 02052608 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\inetcpl.cpl
2015-06-10 10:10 - 2015-05-23 12:28 - 12829696 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ieframe.dll
2015-06-10 10:10 - 2015-05-23 12:28 - 01042944 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\actxprxy.dll
2015-06-10 10:10 - 2015-05-23 12:20 - 01950720 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\wininet.dll
2015-06-10 10:10 - 2015-05-23 12:16 - 01309696 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\urlmon.dll
2015-06-10 10:10 - 2015-05-23 12:14 - 00710144 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\ieapfltr.dll
2015-06-10 10:10 - 2015-05-23 05:00 - 02885632 _____ (Microsoft Corporation) C:\WINDOWS\system32\iertutil.dll
2015-06-10 10:10 - 2015-05-23 05:00 - 00584192 _____ (Microsoft Corporation) C:\WINDOWS\system32\vbscript.dll
2015-06-10 10:10 - 2015-05-23 05:00 - 00417792 _____ (Microsoft Corporation) C:\WINDOWS\system32\html.iec
2015-06-10 10:10 - 2015-05-23 04:52 - 06026240 _____ (Microsoft Corporation) C:\WINDOWS\system32\jscript9.dll
2015-06-10 10:10 - 2015-05-23 04:48 - 00633856 _____ (Microsoft Corporation) C:\WINDOWS\system32\ieui.dll
2015-06-10 10:10 - 2015-05-23 04:47 - 00816640 _____ (Microsoft Corporation) C:\WINDOWS\system32\jscript.dll
2015-06-10 10:10 - 2015-05-23 04:47 - 00814080 _____ (Microsoft Corporation) C:\WINDOWS\system32\jscript9diag.dll
2015-06-10 10:10 - 2015-05-23 04:24 - 00092160 _____ (Microsoft Corporation) C:\WINDOWS\system32\mshtmled.dll
2015-06-10 10:10 - 2015-05-23 04:23 - 00145408 _____ (Microsoft Corporation) C:\WINDOWS\system32\iepeers.dll
2015-06-10 10:10 - 2015-05-23 04:21 - 00316928 _____ (Microsoft Corporation) C:\WINDOWS\system32\dxtrans.dll
2015-06-10 10:10 - 2015-05-23 04:15 - 01032704 _____ (Microsoft Corporation) C:\WINDOWS\system32\inetcomm.dll
2015-06-10 10:10 - 2015-05-23 04:09 - 00262144 _____ (Microsoft Corporation) C:\WINDOWS\system32\webcheck.dll
2015-06-10 10:10 - 2015-05-23 04:08 - 00374272 _____ (Microsoft Corporation) C:\WINDOWS\system32\iedkcs32.dll
2015-06-10 10:10 - 2015-05-23 04:06 - 00801280 _____ (Microsoft Corporation) C:\WINDOWS\system32\msfeeds.dll
2015-06-10 10:10 - 2015-05-23 04:05 - 02125824 _____ (Microsoft Corporation) C:\WINDOWS\system32\inetcpl.cpl
2015-06-10 10:10 - 2015-05-23 03:57 - 14404096 _____ (Microsoft Corporation) C:\WINDOWS\system32\ieframe.dll
2015-06-10 10:10 - 2015-05-23 03:50 - 02426880 _____ (Microsoft Corporation) C:\WINDOWS\system32\wininet.dll
2015-06-10 10:10 - 2015-05-23 03:49 - 02865152 _____ (Microsoft Corporation) C:\WINDOWS\system32\actxprxy.dll
2015-06-10 10:10 - 2015-05-23 03:38 - 01545728 _____ (Microsoft Corporation) C:\WINDOWS\system32\urlmon.dll
2015-06-10 10:10 - 2015-05-23 03:26 - 00800768 _____ (Microsoft Corporation) C:\WINDOWS\system32\ieapfltr.dll
2015-06-10 10:10 - 2015-05-22 02:47 - 04177920 _____ (Microsoft Corporation) C:\WINDOWS\system32\win32k.sys
2015-06-10 10:10 - 2015-04-25 12:34 - 00653824 _____ (Microsoft Corporation) C:\WINDOWS\system32\comctl32.dll
2015-06-10 10:10 - 2015-04-25 12:33 - 00549888 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\comctl32.dll
2015-06-10 10:10 - 2015-04-16 16:17 - 00325464 ____C (Microsoft Corporation) C:\WINDOWS\system32\Drivers\USBXHCI.SYS
2015-06-10 10:10 - 2015-04-14 08:37 - 00275968 _____ (Microsoft Corporation) C:\WINDOWS\system32\authz.dll
2015-06-10 10:10 - 2015-04-14 08:34 - 00180224 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\authz.dll
2015-06-10 10:10 - 2015-04-10 10:40 - 01249280 _____ (Microsoft Corporation) C:\WINDOWS\system32\UIAutomationCore.dll
2015-06-10 10:10 - 2015-04-10 10:17 - 01018880 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\UIAutomationCore.dll
2015-06-10 10:10 - 2015-04-01 14:21 - 00337408 _____ (Microsoft Corporation) C:\WINDOWS\system32\SearchProtocolHost.exe
2015-06-10 10:10 - 2015-04-01 14:18 - 00468480 _____ (Microsoft Corporation) C:\WINDOWS\system32\mssph.dll
2015-06-10 10:10 - 2015-04-01 14:17 - 00248832 _____ (Microsoft Corporation) C:\WINDOWS\system32\mssphtb.dll
2015-06-10 10:10 - 2015-04-01 14:08 - 00774144 _____ (Microsoft Corporation) C:\WINDOWS\system32\mssvp.dll
2015-06-10 10:10 - 2015-04-01 13:46 - 03633664 _____ (Microsoft Corporation) C:\WINDOWS\system32\tquery.dll
2015-06-10 10:10 - 2015-04-01 13:17 - 02551808 _____ (Microsoft Corporation) C:\WINDOWS\system32\mssrch.dll
2015-06-10 10:10 - 2015-04-01 13:17 - 00903168 _____ (Microsoft Corporation) C:\WINDOWS\system32\SearchIndexer.exe
2015-06-10 10:10 - 2015-04-01 12:53 - 00391680 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mssph.dll
2015-06-10 10:10 - 2015-04-01 12:53 - 00272896 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SearchProtocolHost.exe
2015-06-10 10:10 - 2015-04-01 12:45 - 02749952 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\tquery.dll
2015-06-10 10:10 - 2015-04-01 12:45 - 00699392 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mssvp.dll
2015-06-10 10:10 - 2015-04-01 12:14 - 01920000 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\mssrch.dll
2015-06-10 10:10 - 2015-04-01 12:12 - 00710144 _____ (Microsoft Corporation) C:\WINDOWS\SysWOW64\SearchIndexer.exe
2015-06-07 13:53 - 2015-06-07 13:53 - 00000000 ____D C:\Users\User\AppData\Roaming\Tera_Awesomium
2015-06-06 17:55 - 2015-06-06 17:55 - 00175488 _____ C:\Users\User\Downloads\Fallout 3 - Game of the Year Edition [Final]-RELOADED [www.OMGTORRENT.com].torrent
2015-06-06 14:05 - 2015-06-06 14:05 - 00005290 _____ C:\Users\User\Downloads\[kat.cr]steamgirl.amber.latex.torrent
2015-06-03 16:21 - 2015-06-03 16:21 - 00000000 ____D C:\Users\User\AppData\Local\GWX
2015-06-03 12:44 - 2015-06-03 13:18 - 00000000 ____D C:\Users\User\Downloads\FIX
2015-06-03 12:44 - 2015-06-03 12:44 - 01094283 _____ C:\Users\User\Downloads\FIX.zip
2015-05-29 17:42 - 2015-05-29 17:42 - 00000000 ____D C:\Users\User\AppData\Roaming\java
2015-05-29 17:32 - 2015-06-13 15:28 - 00000000 ____D C:\Users\User\AppData\Roaming\Curse Client
2015-05-29 17:32 - 2015-05-29 17:32 - 00001077 _____ C:\Users\User\Desktop\Curse.lnk
2015-05-29 17:32 - 2015-05-29 17:32 - 00001063 _____ C:\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Curse.lnk
2015-05-29 17:31 - 2015-05-29 17:31 - 00000000 ____D C:\Users\User\AppData\Roaming\Curse
2015-05-29 17:30 - 2015-05-29 17:30 - 42119864 _____ (Curse) C:\Users\User\Downloads\CurseClientSetup.exe
2015-05-29 17:23 - 2015-06-13 15:28 - 00000000 ____D C:\Users\User\AppData\Local\Deployment
2015-05-29 17:23 - 2015-05-29 17:26 - 00000000 ____D C:\Users\User\AppData\Roaming\Curse Advertising
2015-05-29 17:23 - 2015-05-29 17:23 - 00000318 _____ C:\Users\User\Desktop\Curse Client.appref-ms
2015-05-29 17:23 - 2015-05-29 17:23 - 00000000 ____D C:\Users\User\Documents\My Curse
2015-05-29 17:23 - 2015-05-29 17:23 - 00000000 ____D C:\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Curse
2015-05-29 17:23 - 2015-05-29 17:23 - 00000000 ____D C:\Users\User\AppData\Local\Apps\2.0
2015-05-29 17:22 - 2015-05-29 17:22 - 00402696 _____ () C:\Users\User\Downloads\setup.exe
2015-05-29 17:19 - 2015-05-29 17:19 - 00000000 ____D C:\Users\User\Downloads\AS2 1.1.1
2015-05-29 17:17 - 2015-05-29 17:18 - 151754687 _____ C:\Users\User\Downloads\AS2 1.1.1.zip
2015-05-27 16:06 - 2015-05-27 16:06 - 00000000 ____D C:\Users\User\Desktop\JOB bleep
2015-05-27 14:55 - 2015-05-27 14:56 - 04197016 _____ (Kaspersky Lab ZAO) C:\Users\User\Downloads\tdsskiller.exe
2015-05-20 21:01 - 2015-05-20 21:02 - 02399777 _____ C:\Users\User\Downloads\Droidbooru.apk
 
==================== One Month Modified files and folders ========
 
(If an entry is included in the fixlist, the file/folder will be moved.)
 
2015-06-13 15:57 - 2013-12-21 23:57 - 00000302 _____ C:\WINDOWS\Tasks\UpdaterEX.job
2015-06-13 15:39 - 2015-03-01 20:57 - 01534613 _____ C:\WINDOWS\WindowsUpdate.log
2015-06-13 15:34 - 2014-09-25 02:21 - 00863592 _____ C:\WINDOWS\system32\PerfStringBackup.INI
2015-06-13 15:28 - 2014-11-06 08:50 - 00000000 ____D C:\Users\User\AppData\Roaming\Raptr
2015-06-13 15:27 - 2015-05-05 14:42 - 00065278 _____ C:\WINDOWS\PFRO.log
2015-06-13 15:27 - 2015-04-13 13:06 - 00011403 _____ C:\WINDOWS\setupact.log
2015-06-13 15:27 - 2014-01-05 10:08 - 00000916 _____ C:\WINDOWS\Tasks\GoogleUpdateTaskMachineCore.job
2015-06-13 15:27 - 2013-08-23 00:45 - 00000006 ____H C:\WINDOWS\Tasks\SA.DAT
2015-06-13 15:27 - 2013-04-11 22:46 - 00000000 ____D C:\ProgramData\APN
2015-06-13 15:18 - 2014-08-21 08:39 - 00136408 _____ (Malwarebytes Corporation) C:\WINDOWS\system32\Drivers\MBAMSwissArmy.sys
2015-06-13 15:09 - 2012-07-27 07:04 - 00000830 _____ C:\WINDOWS\Tasks\Adobe Flash Player Updater.job
2015-06-13 15:04 - 2014-01-05 10:08 - 00000920 _____ C:\WINDOWS\Tasks\GoogleUpdateTaskMachineUA.job
2015-06-13 15:04 - 2013-08-22 23:25 - 00524288 ___SH C:\WINDOWS\system32\config\BBI
2015-06-13 15:00 - 2013-08-23 01:36 - 00000000 ____D C:\WINDOWS\system32\sru
2015-06-13 14:54 - 2013-08-23 01:36 - 00000000 ____D C:\WINDOWS\rescache
2015-06-13 14:35 - 2015-04-16 13:52 - 05155112 _____ C:\WINDOWS\system32\FNTCACHE.DAT
2015-06-13 14:34 - 2015-04-16 02:32 - 00000000 ____D C:\WINDOWS\system32\appraiser
2015-06-13 14:34 - 2014-09-25 04:55 - 00000000 ___SD C:\WINDOWS\system32\CompatTel
2015-06-13 14:34 - 2013-08-23 01:36 - 00000000 ___RD C:\WINDOWS\ToastData
2015-06-13 14:34 - 2013-08-23 01:36 - 00000000 ____D C:\WINDOWS\SysWOW64\en-GB
2015-06-13 14:34 - 2013-08-23 01:36 - 00000000 ____D C:\WINDOWS\system32\en-GB
2015-06-13 14:34 - 2013-08-23 01:36 - 00000000 ____D C:\WINDOWS\PolicyDefinitions
2015-06-13 14:29 - 2013-02-27 09:29 - 00000000 ____D C:\Users\User\AppData\Roaming\uTorrent
2015-06-12 23:52 - 2013-02-14 15:03 - 00000000 ____D C:\Users\User\AppData\Roaming\vlc
2015-06-12 19:24 - 2014-11-06 21:27 - 00000000 ____D C:\Users\User\AppData\Local\ftblauncher
2015-06-10 19:03 - 2012-07-27 07:07 - 00003598 _____ C:\WINDOWS\System32\Tasks\Optimize Start Menu Cache Files-S-1-5-21-558910080-3827423310-2547630886-1001
2015-06-10 14:22 - 2015-05-01 16:16 - 00000000 ____D C:\ProgramData\Microsoft Help
2015-06-10 14:22 - 2013-08-14 15:04 - 00000000 ____D C:\WINDOWS\system32\MRT
2015-06-10 14:22 - 2012-07-26 17:59 - 00000000 ____D C:\WINDOWS\CbsTemp
2015-06-10 14:18 - 2012-07-27 03:02 - 140135120 _____ (Microsoft Corporation) C:\WINDOWS\system32\MRT.exe
2015-06-10 03:09 - 2012-07-27 07:04 - 00003718 _____ C:\WINDOWS\System32\Tasks\Adobe Flash Player Updater
2015-06-09 19:52 - 2014-03-03 20:16 - 00000000 ___RD C:\Users\User\Desktop\Porn
2015-06-08 21:46 - 2013-08-23 01:36 - 00000000 ____D C:\WINDOWS\AppReadiness
2015-06-06 18:08 - 2014-12-02 17:33 - 00000000 ____D C:\Users\User\AppData\Roaming\.technic
2015-06-06 18:08 - 2014-09-30 20:41 - 04697768 _____ () C:\Users\User\Downloads\TechnicLauncher.exe
2015-06-04 02:18 - 2014-09-25 05:00 - 00792568 _____ (Adobe Systems Incorporated) C:\WINDOWS\SysWOW64\FlashPlayerApp.exe
2015-06-04 02:18 - 2014-09-25 05:00 - 00178168 _____ (Adobe Systems Incorporated) C:\WINDOWS\SysWOW64\FlashPlayerCPLApp.cpl
2015-06-04 00:41 - 2013-02-24 15:48 - 04466688 ___SH C:\Users\User\Desktop\Thumbs.db
2015-06-03 19:13 - 2013-02-23 22:24 - 00537088 ___SH C:\Users\User\Downloads\Thumbs.db
2015-06-03 16:19 - 2013-08-23 01:36 - 00000000 ____D C:\WINDOWS\system32\NDF
2015-06-03 12:04 - 2015-05-01 16:25 - 00000000 ____D C:\Users\User\Documents\TESOL
2015-06-01 21:53 - 2014-11-09 08:28 - 00000000 ____D C:\ProgramData\Package Cache
2015-05-29 17:23 - 2013-08-19 18:21 - 00000000 ____D C:\Users\User\AppData\Roaming\.minecraft
2015-05-27 16:10 - 2013-04-17 14:49 - 00000000 ____D C:\ProgramData\boost_interprocess
2015-05-27 14:49 - 2014-08-20 00:32 - 00000000 ____D C:\Program Files (x86)\Anomos
2015-05-27 14:22 - 2015-05-11 22:40 - 00000000 ____D C:\ProgramData\11885256986448313910
2015-05-26 22:01 - 2015-05-12 14:31 - 00000000 ____D C:\ProgramData\44110cad00001647
2015-05-25 00:29 - 2014-03-10 11:56 - 00007599 _____ C:\Users\User\AppData\Local\Resmon.ResmonCfg
2015-05-22 05:06 - 2015-04-05 11:25 - 00000000 ___SD C:\WINDOWS\SysWOW64\GWX
2015-05-22 05:06 - 2015-04-05 11:25 - 00000000 ___SD C:\WINDOWS\system32\GWX
2015-05-17 02:23 - 2013-08-23 01:36 - 00000000 ___RD C:\WINDOWS\ImmersiveControlPanel
2015-05-17 02:23 - 2013-08-22 23:36 - 00000000 ____D C:\WINDOWS\system32\AdvancedInstallers
2015-05-15 13:59 - 2014-01-05 10:08 - 00003892 _____ C:\WINDOWS\System32\Tasks\GoogleUpdateTaskMachineUA
2015-05-15 13:59 - 2014-01-05 10:08 - 00003656 _____ C:\WINDOWS\System32\Tasks\GoogleUpdateTaskMachineCore
 
==================== Files in the root of some directories =======
 
2013-02-24 23:14 - 2013-02-24 23:14 - 0703117 _____ () C:\Users\User\AppData\Roaming\technic-launcher.jar
2013-12-22 00:57 - 2014-07-20 00:58 - 0000271 _____ () C:\Users\User\AppData\Roaming\WB.CFG
2014-03-10 11:56 - 2015-05-25 00:29 - 0007599 _____ () C:\Users\User\AppData\Local\Resmon.ResmonCfg
2015-05-12 14:31 - 2015-05-12 14:31 - 0000000 _____ () C:\Users\User\AppData\Local\Temp.dat
 
Some files in TEMP:
====================
C:\Users\User\AppData\Local\Temp\mirc741.exe
C:\Users\User\AppData\Local\Temp\ose00000.exe
 
 
==================== Bamital & volsnap Check =================
 
(There is no automatic fix for files that do not pass verification.)
 
C:\Windows\System32\winlogon.exe => File is digitally signed
C:\Windows\System32\wininit.exe => File is digitally signed
C:\Windows\explorer.exe => File is digitally signed
C:\Windows\SysWOW64\explorer.exe => File is digitally signed
C:\Windows\System32\svchost.exe => File is digitally signed
C:\Windows\SysWOW64\svchost.exe => File is digitally signed
C:\Windows\System32\services.exe => File is digitally signed
C:\Windows\System32\User32.dll => File is digitally signed
C:\Windows\SysWOW64\User32.dll => File is digitally signed
C:\Windows\System32\userinit.exe => File is digitally signed
C:\Windows\SysWOW64\userinit.exe => File is digitally signed
C:\Windows\System32\rpcss.dll => File is digitally signed
C:\Windows\System32\Drivers\volsnap.sys => File is digitally signed
 
 
LastRegBack: 2015-06-13 14:45
 
==================== End of log ============================

Attached Files



BC AdBot (Login to Remove)

 


m

#2 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:33 AM

Posted 14 June 2015 - 06:20 AM

Hello! Welcome to BleepingComputer Forums! :welcome:
My name is Georgi and and I will be helping you with your computer problems.

Before we begin, please note the following:

  • I will working be on your Malware issues, this may or may not, solve other issues you have with your machine.
  • The logs can take some time to research, so please be patient with me.
  • Stay with the topic until I tell you that your system is clean. Missing symptoms does not mean that everything is okay.
  • Instructions that I give are for your system only!
  • Please do not run any tools until requested ! The reason for this is so I know what is going on with the machine at any time. Some programs can interfere with others and hamper the recovery process.
  • Please perform all steps in the order received. If you can't understand something don't hesitate to ask.
  • Again I would like to remind you to make no further changes to your computer unless I direct you to do so. I will not help you if you do not follow my instructions.

 

Let me see the logs and reply back with a fix.

 

 

Regards,

Georgi


cXfZ4wS.png


#3 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:33 AM

Posted 14 June 2015 - 03:29 PM

Hi,
 
 
Please download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.

Let me know how are things after the fix above.

 
Regards,
Georgi


cXfZ4wS.png


#4 Fluens

Fluens
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:33 PM

Posted 14 June 2015 - 08:51 PM

Hello, Thanks for the help!

So far the fix has stopped the process from running.

 

here is the log

Fix result of Farbar Recovery Scan Tool (x64) Version:13-06-2015
Ran by User at 2015-06-15 11:06:15 Run:1
Running from C:\Users\User\Downloads
Loaded Profiles: User (Available Profiles: User)
Boot Mode: Normal
==============================================
 
fixlist content:
*****************
start
CreateRestorePoint:
CloseProcesses:
C:\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\microsoft-word-2013.lnk
C:\ProgramData\{3ae7d3bd-dec2-d72f-3ae7-7d3bddec4ef7}
C:\Windows\Temp\svchost.exe
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\MountPoints2: {7202bd08-15af-11e4-beb2-50465dabf302} - "I:\setup.exe"
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\...\MountPoints2: {7f40dc3c-0820-11e4-beb0-50465dabf302} - "H:\setup.exe"
CHR HKLM\SOFTWARE\Policies\Google: Policy restriction <======= ATTENTION
FF Extension: No Name - C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\extensions\searchffv2@gmail.com [not found]
2015-06-13 15:27 - 2013-04-11 22:46 - 00000000 ____D C:\ProgramData\APN
2015-05-27 16:10 - 2013-04-17 14:49 - 00000000 ____D C:\ProgramData\boost_interprocess
2015-05-27 14:22 - 2015-05-11 22:40 - 00000000 ____D C:\ProgramData\11885256986448313910
2015-05-26 22:01 - 2015-05-12 14:31 - 00000000 ____D C:\ProgramData\44110cad00001647
Task: {517FF0AC-9312-4252-8C93-A16AE677E659} - \Runner IC No Task File <==== ATTENTION
Task: {7174E7D9-873C-4B61-828E-5568F0DFAD45} - System32\Tasks\LaunchSignup => C:\Program Files (x86)\MyPC Backup\Signup Wizard.exe <==== ATTENTION
Task: {C159AB59-3234-4A68-A7C2-151095E386EE} - System32\Tasks\UpdaterEX => C:\Users\User\AppData\Roaming\UPDATE~1\UPDATE~1\UPDATE~1.EXE <==== ATTENTION
Task: {DB15B16F-B5DC-4E67-BA21-720F0BE6B2F9} - \Microsoft\Windows\Maintenance\Update IC No Task File <==== ATTENTION
Task: {DEF59B09-C1EC-476B-BD0B-26ECCD514592} - System32\Tasks\Origin => C:\ProgramData\Origin\update.vbe [2015-04-09] () <==== ATTENTION
Task: C:\WINDOWS\Tasks\UpdaterEX.job => C:\Users\User\AppData\Roaming\UPDATE~1\UPDATE~1\UPDATE~1.EXE <==== ATTENTION
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\46699705.sys => ""="Driver"
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\46699705.sys => ""="Driver"
C:\Program Files (x86)\MyPC Backup
C:\Users\User\AppData\Roaming\UPDATE~1
C:\ProgramData\Origin\update.vbe
cmd: bitsadmin /reset /allusers
cmd: netsh winsock reset catalog
cmd: ipconfig /flushdns
EmptyTemp:
End
*****************
 
Restore point was successfully created.
Processes closed successfully.
C:\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\microsoft-word-2013.lnk => moved successfully.
C:\ProgramData\{3ae7d3bd-dec2-d72f-3ae7-7d3bddec4ef7} => moved successfully.
C:\Windows\Temp\svchost.exe => moved successfully.
"HKU\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{7202bd08-15af-11e4-beb2-50465dabf302}" => key removed successfully
HKCR\CLSID\{7202bd08-15af-11e4-beb2-50465dabf302} => key not found. 
"HKU\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{7f40dc3c-0820-11e4-beb0-50465dabf302}" => key removed successfully
HKCR\CLSID\{7f40dc3c-0820-11e4-beb0-50465dabf302} => key not found. 
"HKLM\SOFTWARE\Policies\Google" => key removed successfully
C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\extensions\searchffv2@gmail.com not found.
C:\ProgramData\APN => moved successfully.
C:\ProgramData\boost_interprocess => moved successfully.
C:\ProgramData\11885256986448313910 => moved successfully.
C:\ProgramData\44110cad00001647 => moved successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{517FF0AC-9312-4252-8C93-A16AE677E659}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{517FF0AC-9312-4252-8C93-A16AE677E659}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Runner IC" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{7174E7D9-873C-4B61-828E-5568F0DFAD45}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{7174E7D9-873C-4B61-828E-5568F0DFAD45}" => key removed successfully
C:\Windows\System32\Tasks\LaunchSignup => moved successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\LaunchSignup" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{C159AB59-3234-4A68-A7C2-151095E386EE}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C159AB59-3234-4A68-A7C2-151095E386EE}" => key removed successfully
C:\Windows\System32\Tasks\UpdaterEX => moved successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\UpdaterEX" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{DB15B16F-B5DC-4E67-BA21-720F0BE6B2F9}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{DB15B16F-B5DC-4E67-BA21-720F0BE6B2F9}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Maintenance\Update IC" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{DEF59B09-C1EC-476B-BD0B-26ECCD514592}" => key removed successfully
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{DEF59B09-C1EC-476B-BD0B-26ECCD514592}" => key removed successfully
C:\Windows\System32\Tasks\Origin => moved successfully.
"HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Origin" => key removed successfully
C:\WINDOWS\Tasks\UpdaterEX.job => moved successfully.
"HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal\46699705.sys" => key removed successfully
"HKLM\System\CurrentControlSet\Control\SafeBoot\Network\46699705.sys" => key removed successfully
"C:\Program Files (x86)\MyPC Backup" => File/Folder not found.
C:\Users\User\AppData\Roaming\UPDATE~1 => moved successfully.
C:\ProgramData\Origin\update.vbe => moved successfully.
 
=========  bitsadmin /reset /allusers =========
 
 
BITSADMIN version 3.0 [ 7.7.9600 ]
BITS administration utility.
© Copyright 2000-2006 Microsoft Corp.
 
BITSAdmin is deprecated and is not guaranteed to be available in future versions of Windows.
Administrative tools for the BITS service are now provided by BITS PowerShell cmdlets.
 
{F7F28A07-30AE-4EF5-A9F9-92DD6D8F6A86} canceled.
{E90B33BC-5666-439A-B4E0-4583134C1F1D} canceled.
2 out of 2 jobs canceled.
 
========= End of CMD: =========
 
 
=========  netsh winsock reset catalog =========
 
 
Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.
 
 
========= End of CMD: =========
 
 
=========  ipconfig /flushdns =========
 
 
Windows IP Configuration
 
Successfully flushed the DNS Resolver Cache.
 
========= End of CMD: =========
 
EmptyTemp: => 687.2 MB temporary data Removed.
 
 
The system needed a reboot.. 
 
==== End of Fixlog 11:06:23 ====


#5 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:33 AM

Posted 15 June 2015 - 12:44 AM

Hi,

 

I am glad to hear that. Let's check for leftovers.

 

 

 

STEP 1

 

 

Please download Malwarebytes Anti-Malware 2.1.6.1022 Final to your desktop.
 

  • Double-click mbam-setup-2.1.6.1022.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish.
  • On the Settings tab > Detection and Protection subtab, Detection Options, tick the box 'Scan for rootkits'.
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • With some infections, you may see this message box.
    • 'Could not load DDA driver'
  • Click 'Yes' to this message, to allow the driver to load after a restart.
  • Allow the computer to restart. Continue with the rest of these instructions.
  • When the scan is complete, click Apply Actions.
  • Wait for the prompt to restart the computer to appear, then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

 

 

STEP 2

 

 

 

1.Please download HitmanPro.

  • For 32-bit Operating System - dEMD6.gif.
  • This is the mirror - dEMD6.gif
  • For 64-bit Operating System - dEMD6.gif
  • This is the mirror - dEMD6.gif

2.Launch the program by double clicking on the 5vo5F.jpg icon. (Windows Vista/7 users right click on the HitmanPro icon and select run as administrator).

Note: If the program won't run please then open the program while holding down the left CTRL key until the program is loaded.

3.Click on the next button. You must agree with the terms of EULA. (if asked)

4.Check the box beside "No, I only want to perform a one-time scan to check this computer".

5.Click on the next button.

6.The program will start to scan the computer. The scan will typically take no more than 2-3 minutes.

7.When the scan is done click on drop-down menu of the found entries (if any) and choose - Apply to all => Ignore <= IMPORTANT!!!

 

6-scanfin-choose.jpg
 
8.Click on the next button.

9.Click on the "Save Log" button.

10.Save that file to your desktop and post the content of that file in your next reply.
 
Note: if there isn't a dropdown menu when the scan is done then please don't delete anything and close HitmanPro

Navigate to C:\ProgramData\HitmanPro\Logs open the report and copy and paste it to your next reply.

 

Note: Programdata is hidden by default. Please make sure that you can view all hidden files. Instructions on how to do this can be found here:
How to see hidden files in Windows

 

 

 

STEP 3

 

 

emsisoft_emergency_kit.pnglogo.png

  • Download EmsisoftEmergencyKit, run the exe and extract the content in a folder of your choice like (C:\EEK) by clicking the Extract button.
  • Double-click the desktop-shortcut called Start Emsisoft Emergency Kit to start the tool.
  • Click on the "Yes" button when asked to obtain the latest malware definitions.
  • Once the update is complete click "Scan".
  • Click on the "Yes" button when asked to enable the scan for Potentially Unwanted Applications.
  • Next click on the Full Scan. When the scan complete, click on the View Report button (don't delete or quarantine anything).
  • Please copy and paste the content of the report in your next reply.

 

 

Regards,

Georgi


cXfZ4wS.png


#6 Fluens

Fluens
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:33 PM

Posted 15 June 2015 - 07:50 AM

Alrighty!

 

Here is the malware-bytes log

 

Malwarebytes Anti-Malware
 
Scan Date: 15/06/2015
Scan Time: 4:56:36 PM
Logfile: 
Administrator: Yes
 
Version: 2.01.6.1022
Malware Database: v2015.06.15.01
Rootkit Database: v2015.06.02.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 8.1
CPU: x64
File System: NTFS
User: User
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 400416
Time Elapsed: 8 min, 25 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Warn
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 0
(No malicious items detected)
 
Physical Sectors: 0
(No malicious items detected)
 
And here is the Hitman Pro log
 

[code=auto:0]
HitmanPro 3.7.9.241
www.hitmanpro.com
 
   Computer name . . . . : FLUENS
   Windows . . . . . . . : 6.3.0.9600.X64/8
   User name . . . . . . : FLUENS\User
   UAC . . . . . . . . . : Enabled
   License . . . . . . . : Free
 
   Scan date . . . . . . : 2015-06-15 17:13:12
   Scan mode . . . . . . : Normal
   Scan duration . . . . : 5m 34s
   Disk access mode  . . : Direct disk access (SRB)
   Cloud . . . . . . . . : Internet
   Reboot  . . . . . . . : No
 
   Threats . . . . . . . : 2
   Traces  . . . . . . . : 41
 
   Objects scanned . . . : 1,814,076
   Files scanned . . . . : 61,626
   Remnants scanned  . . : 328,608 files / 1,423,842 keys
 
Malware _____________________________________________________________________
 
   C:\Users\User\Downloads\microsoft-word-2013.exe
      Size . . . . . . . : 301,568 bytes
      Age  . . . . . . . : 45.1 days (2015-05-01 15:59:32)
      Entropy  . . . . . : 6.8
      SHA-256  . . . . . : 2ABFACCD10C6E39F11960C642754C6BF9FD49A9D4724EA047F8E2811AB48BBA0
    > Bitdefender  . . . : Gen:Variant.Adware.Kazy.605162
    > Kaspersky  . . . . : not-a-virus:HEUR:AdWare.Win32.Generic
      Fuzzy  . . . . . . : 106.0
      References
         C:\Users\User\Desktop\microsoft-word-2013.lnk
 
 
Suspicious files ____________________________________________________________
 
   C:\Users\User\AppData\Local\PunkBuster\FC3\pb\pbcl.dll
      Size . . . . . . . : 953,886 bytes
      Age  . . . . . . . : 534.7 days (2013-12-27 23:59:49)
      Entropy  . . . . . : 7.6
      SHA-256  . . . . . : 6D5E2CD4A7A43EB00B600BA783AD3BEE6B817C030A40600D40367173A6ECEB13
      Fuzzy  . . . . . . : 29.0
         The .reloc (relocation) section in this program contains code. This is an indication of malware infection.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Program contains PE structure anomalies. This is not typical for most programs.
 
   C:\Users\User\AppData\Local\PunkBuster\FC3\pb\PnkBstrK.sys
      Size . . . . . . . : 138,032 bytes
      Age  . . . . . . . : 534.7 days (2013-12-28 00:00:03)
      Entropy  . . . . . : 7.8
      SHA-256  . . . . . : ABAF3FACF01E10E4C685F79C3B9E5D2118B3CF8629C4277EBE035B2A10474148
      RSA Key Size . . . : 2048
      Authenticode . . . : Valid
      Fuzzy  . . . . . . : 22.0
         The .reloc (relocation) section in this program contains code. This is an indication of malware infection.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Program contains PE structure anomalies. This is not typical for most programs.
         The file is a device driver. Device drivers run as trusted (highly privileged) code.
         Program is code signed with a valid Authenticode certificate.
 
   C:\Users\User\Downloads\Current Demo\Current Demo\gif.dll
      Size . . . . . . . : 32,768 bytes
      Age  . . . . . . . : 88.9 days (2015-03-18 19:09:51)
      Entropy  . . . . . : 5.7
      SHA-256  . . . . . : C388F705424AC6EFE60F9BBA0D6F83F0D9A7F4D8E37513BB51587D3721F25221
      Fuzzy  . . . . . . : 25.0
         The .reloc (relocation) section in this program contains code. This is an indication of malware infection.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Program contains PE structure anomalies. This is not typical for most programs.
 
   C:\Users\User\Downloads\Current Demo\Current Demo\rubyscreen.dll
      Size . . . . . . . : 28,160 bytes
      Age  . . . . . . . : 88.9 days (2015-03-18 19:09:53)
      Entropy  . . . . . : 5.6
      SHA-256  . . . . . : 777055E7400B49941CC083F86343C8BB5C8C067021B32435809E87E4BEBE3807
      Fuzzy  . . . . . . : 25.0
         The .reloc (relocation) section in this program contains code. This is an indication of malware infection.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Program contains PE structure anomalies. This is not typical for most programs.
 
   C:\Users\User\Downloads\FRST-OlderVersion\FRST64.exe
      Size . . . . . . . : 2,108,928 bytes
      Age  . . . . . . . : 2.1 days (2015-06-13 15:58:37)
      Entropy  . . . . . : 7.5
      SHA-256  . . . . . : 23B98F644F9BFE0B6E32E501CCA88839EA890F22C65C722198E6A4C3C421A628
      Needs elevation  . : Yes
      Fuzzy  . . . . . . : 24.0
         Program has no publisher information but prompts the user for permission elevation.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Time indicates that the file appeared recently on this computer.
 
   C:\Users\User\Downloads\FRST64.exe
      Size . . . . . . . : 2,109,952 bytes
      Age  . . . . . . . : 0.3 days (2015-06-15 11:05:45)
      Entropy  . . . . . : 7.5
      SHA-256  . . . . . : 66759EE8F6AD33D758C63F59133C70D9E853C4C8A4DFC8021253D68B7DB49BC9
      Needs elevation  . : Yes
      Fuzzy  . . . . . . : 24.0
         Program has no publisher information but prompts the user for permission elevation.
         Entropy (or randomness) indicates the program is encrypted, compressed or obfuscated. This is not typical for most programs.
         Authors name is missing in version info. This is not common to most programs.
         Version control is missing. This file is probably created by an individual. This is not typical for most programs.
         Time indicates that the file appeared recently on this computer.
      Forensic Cluster
         -11.7s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{1B45F7F4-8E55-45F9-9A0D-6267B9E1F58B}
         -3.9s C:\ProgramData\Microsoft\Windows\WER\ReportArchive\NonCritical_IPX Assertion_8fe5709a273cf4eae273f696607caf63e3cbad6a_00000000_1b81163c\
         -3.9s C:\ProgramData\Microsoft\Windows\WER\ReportArchive\NonCritical_IPX Assertion_8fe5709a273cf4eae273f696607caf63e3cbad6a_00000000_1b81163c\Report.wer
         -3.5s C:\Windows\Prefetch\JPNIME.EXE-E8B923F4.pf
         -2.3s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{985EC464-71F4-4B7F-AB7B-80540B8DC71B}
          0.0s C:\Users\User\Downloads\FRST64.exe
         29.3s C:\FRST\Logs\ct
         29.3s C:\Users\User\Downloads\Fixlog.txt
         32.7s C:\System Volume Information\SPP\OnlineMetadataCache\{aaac75f5-2f01-44f8-aa93-ad376195ef2d}_OnDiskSnapshotProp
         32.8s C:\System Volume Information\{e08bfb1b-118c-11e5-bee7-83c928d45ab3}{3808876b-c176-4e48-b7ae-04046e6cc752}
         33.9s C:\FRST\Quarantine\C\ProgramData\
         33.9s C:\FRST\Quarantine\C\
         33.9s C:\FRST\Quarantine\C\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\
         33.9s C:\FRST\Quarantine\C\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\
         33.9s C:\FRST\Quarantine\C\Users\User\AppData\Roaming\Microsoft\
         33.9s C:\FRST\Quarantine\C\Users\
         33.9s C:\FRST\Quarantine\C\Users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
         33.9s C:\FRST\Quarantine\C\Users\User\AppData\Roaming\Microsoft\Windows\
         33.9s C:\FRST\Quarantine\C\Users\User\AppData\Roaming\
         33.9s C:\FRST\Quarantine\C\Users\User\AppData\
         33.9s C:\FRST\Quarantine\C\Users\User\
         34.0s C:\FRST\Quarantine\C\Windows\Temp\
         34.0s C:\FRST\Quarantine\C\Windows\
         34.2s C:\Windows\Prefetch\DLLHOST.EXE-E4DB4546.pf
         34.2s C:\Windows\Prefetch\SRTASKS.EXE-4F77756F.pf
         34.3s C:\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\SystemIndex.112.gthr
         34.3s C:\ProgramData\Microsoft\Search\Data\Applications\Windows\GatherLogs\SystemIndex\SystemIndex.112.Crwl
         34.5s C:\FRST\Quarantine\C\Windows\System32\Tasks\
         34.5s C:\FRST\Quarantine\C\Windows\System32\
         34.6s C:\FRST\Quarantine\C\Windows\Tasks\
         34.6s C:\FRST\Quarantine\C\ProgramData\Origin\
         34.8s C:\Windows\Prefetch\BITSADMIN.EXE-71339457.pf
         35.2s C:\Windows\Prefetch\NETSH.EXE-F1B6DA12.pf
         35.3s C:\Windows\Prefetch\IPCONFIG.EXE-912F3D5B.pf
         36.0s C:\Windows\System32\winevt\Logs\Microsoft-Windows-Winsock-WS2HELP%4Operational.evtx
         36.6s C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\MpCmdRun.log
         36.8s C:\Windows\Temp\MpCmdRun.log
         37.1s C:\Users\User\AppData\Local\Microsoft\Windows\Caches\{3DA71D5A-20CC-432F-A115-DFE92379E91F}.1.ver0x00000000000001ef.db
         37.5s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_idx.db
         37.5s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db
         43.8s C:\Windows\Prefetch\DASHOST.EXE-5E5F38F6.pf
         44.0s C:\Windows\Prefetch\SEARCHINDEXER.EXE-4A6353B9.pf
         48.8s C:\Windows\Prefetch\SPOOLSV.EXE-D1F6B8B6.pf
         51.1s C:\FRST\Logs\Fixlog_15-06-2015_11-06-36.txt
         54.7s C:\Users\User\AppData\Local\Microsoft\Windows\Caches\{AFBF9F1A-8EE8-4C77-AF34-C647E37CA0D9}.1.ver0x000000000000005f.db
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\01\289
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\10\340
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\21\344
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\05\334
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\15\321
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\08\322
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\11\1252
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\07\290
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\05\341
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\17\345
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\11\291
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\15\292
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\09\13711
         55.2s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Mput\MputHistory\22\302
         73.3s C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTUBPM.etl
         75.5s C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive0.dat
         75.5s C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-Microsoft-Windows-WorkFolders-WHC.etl
         75.5s C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventlog-Security.etl
         76.3s C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTWFP-IPsec Diagnostics.etl
         76.5s C:\Windows\System32\config\systemprofile\AppData\Local\lastalive0.dat
         76.5s C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTDiagtrack-Listener.etl
         76.7s C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\Logs\protection-log-2015-06-15.xml
         76.8s C:\ProgramData\Microsoft\Windows Defender\Support\MpWppTracing-06152015-110702-00000003-ffffffff.bin
         77.5s C:\ProgramData\Microsoft\Windows Defender\IMpService77BDAF73-B396-481F-9042-AD358843EC24.lock
         85.5s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{242DB1BD-9A1F-49C5-8CDE-2F9A14224B12}
         86.0s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\
         86.0s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\
         86.3s C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc\
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Notifications\6224d48dd67911e1be6650465dabf302\BBl8mtt[1].jpg
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_96.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_256.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_1024.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_1600.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_sr.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_wide.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_exif.db
         86.3s C:\Users\User\AppData\Local\Microsoft\Windows\Explorer\thumbcache_wide_alternate.db
         86.4s C:\Users\User\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_IPX Assertion_8fe5709a273cf4eae273f696607caf63e3cbad6a_00000000_0c48417d\
         86.4s C:\Users\User\AppData\Local\Microsoft\Windows\WER\ReportArchive\NonCritical_IPX Assertion_8fe5709a273cf4eae273f696607caf63e3cbad6a_00000000_0c48417d\Report.wer
         88.1s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\container.dat
         88.9s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{A7E8C444-B7F3-4B1D-BCFA-C40D2253A6B2}
         97.5s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{2441170A-664F-4790-89F9-27B98E2548D6}
         97.7s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{F9D7A3E5-2B33-4DE3-A897-4C0D3DF0844E}
         98.3s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{1CE91F86-AADC-451A-AC32-22C86CC29911}
         99.4s C:\Users\User\AppData\Local\Temp\AdobeARM.log
         99.4s C:\Users\User\AppData\Roaming\Curse Client\Logs\CurseClient\20150615010725-03D0.json
         99.5s C:\Users\User\AppData\Local\Temp\Deployment\
         99.7s C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\container.dat
         99.8s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{86928A27-BA14-495A-84C1-E72104350CA7}
         100.2s C:\Users\User\AppData\Roaming\Raptr\version_gold.txt
         100.4s C:\Users\User\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\
         100.5s C:\Users\User\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\226bf5366ee165ec.customDestinations-ms
         100.6s C:\ProgramData\Microsoft\Windows Defender\Scans\MetaStore\2\31\80F4F9D44C3210AB.dat
         100.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\BKG33FMI\
         100.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\GC5NKA47\
         100.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\PAQGKVI2\
         100.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\CP2ZAL46\
         100.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\CP2ZAL46\VTT9FCRD.log
         101.1s C:\Users\User\AppData\Roaming\Raptr\raptr-4.4.2-r96679-release.exe
         102.0s C:\Users\User\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ffed93f9b6d3e435.customDestinations-ms
         102.5s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{F9CEF555-716C-41C4-A105-B30D568C0819}
         102.5s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{93A78688-EED8-41C2-8DE3-79B584E09905}
         102.6s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\PAQGKVI2\addons-tracker-v4[1].htm
         102.6s C:\Users\User\AppData\Local\Microsoft\Windows\History\History.IE5\container.dat
         103.0s C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\FQITLD7G.txt
         103.0s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\GC5NKA47\quant[1].js
         103.1s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\BKG33FMI\f[1].txt
         103.1s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\CP2ZAL46\m[1].gif
         103.3s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\PAQGKVI2\ga[1].js
         103.4s C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\5Y2389TY.txt
         103.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\GMU32380.txt
         104.2s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\GC5NKA47\beacon[1].js
         104.6s C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\I93W82HT.txt
         104.8s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\BKG33FMI\u[1].htm
         105.3s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\CP2ZAL46\989002608[1].htm
         105.3s C:\Users\User\AppData\Local\Temp\Curse\
         107.4s C:\Users\User\AppData\Local\Temp\Curse Client\
         107.4s C:\Users\User\AppData\Local\Temp\Curse Client\1\
         108.9s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{85047379-C3C5-4AF3-8780-109BE86DE253}
         108.9s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{9EA38D4B-F422-4C25-AAA4-F2CC756A2899}
         109.9s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{CBB2F554-10D7-47D0-82F8-FA3731A26F8B}
         109.9s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{BBED7F71-6BCD-4113-92B8-A52310A182DB}
         112.7s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\PAQGKVI2\addons-tracker-v4[2].htm
         112.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\P2JI9E3E.txt
         113.0s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\GC5NKA47\__utm[1].gif
         113.0s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\BKG33FMI\__utm[1].gif
         113.2s C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\0S23OH2C.txt
         113.3s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\CP2ZAL46\m[2].gif
         113.9s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\PAQGKVI2\989002608[1].htm
         116.7s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\GC5NKA47\fwlink[1].htm
         117.2s C:\Users\User\AppData\Local\Microsoft\Windows\INetCache\IE\BKG33FMI\ProdA05BA358C9B5534F-06102015[1].htm
         118.6s C:\Windows\Prefetch\CCLEANER64.EXE-779BD542.pf
         118.6s C:\Windows\Prefetch\RUNDLL32.EXE-3AA7204D.pf
         118.6s C:\Windows\Prefetch\RUNONCE.EXE-0E293DD6.pf
         120.9s C:\Users\User\AppData\Local\Temp\Curse\CurseHardware_dxdiag.xml
         123.5s C:\Users\User\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\82a1c8273e2713e2.customDestinations-ms
         126.3s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{BC691C43-8530-4807-94C1-3C0807516F8A}
         135.5s C:\Windows\ServiceProfiles\LocalService\AppData\Local\lastalive1.dat
         136.5s C:\Windows\System32\config\systemprofile\AppData\Local\lastalive1.dat
         139.5s C:\Windows\Prefetch\STEAMWEBHELPER.EXE-0D5D74DB.pf
         142.4s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{F644EF43-0BA1-4249-B6F6-4CB022A19B88}
         148.3s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{A4ABED13-95FC-42B1-9283-E3BF5D28318A}
         164.0s C:\ProgramData\Microsoft\Windows Defender\Scans\History\Results\Resource\{0C952F16-D95F-46A3-A1FD-3AD8646A7D92}
 
 
Malware remnants ____________________________________________________________
 
   HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}\ (Jotzey)
 
Potential Unwanted Programs _________________________________________________
 
   C:\ProgramData\EmailNotifier\ (MyStart)
   C:\ProgramData\EmailNotifier\EmailNotifier.exe (MyStart)
      Size . . . . . . . : 1,079,872 bytes
      Age  . . . . . . . : 294.7 days (2014-08-25 00:29:23)
      Entropy  . . . . . : 6.6
      SHA-256  . . . . . : 338BEE1F9669D20EC0C6CBD7E1C3FCBF9637862DF66DE4051B170D9BED1CDD6D
      Product  . . . . . : Email Notifier (TimeWarner Edition)
      Publisher
      Description  . . . : Email Notifier User Interface
      Version  . . . . . : 1.0.1.34
      RSA Key Size . . . : 2048
      LanguageID . . . . : 4105
      Authenticode . . . : Valid
      Fuzzy  . . . . . . : -4.0
 
   C:\ProgramData\EmailNotifier\EmailNotifierAPI.dll (MyStart)
      Size . . . . . . . : 858,584 bytes
      Age  . . . . . . . : 294.7 days (2014-08-25 00:29:23)
      Entropy  . . . . . : 6.6
      SHA-256  . . . . . : F41783CDE97511F0DE13485FCCCB8B75A6C2EA9053ECF96D84A28EDD911E42A2
      Product  . . . . . : Email Notifier
      Publisher
      Description  . . . : Email Notifier API
      Version  . . . . . : 1.0.0.58
      RSA Key Size . . . : 2048
      LanguageID . . . . : 4105
      Authenticode . . . : Valid
      Fuzzy  . . . . . . : -4.0
 
   C:\ProgramData\EmailNotifier\EmailNotifierEN.lng (MyStart)
   C:\ProgramData\EmailNotifier\EmailNotifierFR.lng (MyStart)
   browser.search.searchengine.iconURL
   C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\prefs.js
 
   browser.search.searchengine.url
   C:\Users\User\AppData\Roaming\Mozilla\Firefox\Profiles\z5lv425q.default-1375093332740\prefs.js
 
   HKLM\SOFTWARE\Classes\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F}\ (FTDownloader)
   HKLM\SOFTWARE\Classes\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Record\{2009AF2F-5786-3067-8799-B97F7832FDD6}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Record\{915BB7D5-082E-3B91-B1E0-45B5FDE01F24}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Record\{FB2E65F4-5687-33EF-9BBF-4E3C9C98D3B9}\ (FLV Player)
   HKLM\SOFTWARE\Classes\Wow6432Node\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F}\ (FTDownloader)
   HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}\ (FLV Player)
   HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}\ (MyStart)
   HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3152E1F19977892449DC968802CE8964\ (FLV Player)
   HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\649A52D257CA5DB4EAAE8BA9EB23E467\ (FLV Player)
   HKLM\SOFTWARE\Wow6432Node\Conduit\ (Conduit)
   HKLM\SOFTWARE\Wow6432Node\Email Notifier\ (MyStart)
   HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}\ (MyStart)
   HKLM\SOFTWARE\Wow6432Node\SupDp\ (XTab)
   HKLM\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}\ (FLV Player)
   HKU\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\ (UniDeals)
   HKU\S-1-5-18\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\ (UniDeals)
   HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}\ (UniDeals)
   HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ (UniDeals)
   HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Conduit\ (Conduit)
   HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Smartbar\ (Conduit)
   HKU\S-1-5-21-558910080-3827423310-2547630886-1001_Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}\ (UniDeals)
 
Cookies _____________________________________________________________________
 
   C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Cookies:doubleclick.net
   C:\Users\User\AppData\Local\Microsoft\Windows\INetCookies\GMU32380.txt
 


#7 Fluens

Fluens
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:33 PM

Posted 15 June 2015 - 07:52 AM

Sorry for the double post, some issue with emoticons apparently.

 

And here is the Emisoft log
 
Emsisoft Emergency Kit - Version 9.0
Last update: 15/06/2015 5:32:45 PM
User account: FLUENS\User
 
Scan settings:
 
Scan type: Full Scan
Objects: Rootkits, Memory, Traces, C:\, D:\, E:\, H:\
 
Detect PUPs: On
Scan archives: On
ADS Scan: On
File extension filter: Off
Advanced caching: On
Direct disk access: Off
 
Scan start: 15/06/2015 5:33:52 PM
Key: HKEY_USERS\.DEFAULT\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}  detected: Application.Bundle (A
Key: HKEY_USERS\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}  detected: Application.Bundle (A
Key: HKEY_USERS\S-1-5-18\SOFTWARE\APPDATALOW\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}  detected: Application.Bundle (A
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ytd video downloader  detected: Application.AdStart (A
C:\Users\User\AppData\Roaming\getrighttogo  detected: Application.AppInstall (A
C:\ProgramData\ytd video downloader  detected: Application.AppInstall (A
Key: HKEY_USERS\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\CONDUIT  detected: Application.InstallAd (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\CONDUIT  detected: Application.InstallAd (A
Key: HKEY_USERS\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\SMARTBAR  detected: Application.InstallAd (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}  detected: Application.AdGenie (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}  detected: Application.AdReg (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}  detected: Application.Win32.WebApp (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96}  detected: Application.AdReg (A
Key: HKEY_USERS\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\STARTSEARCH  detected: Application.InstallAd (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\SUPDP  detected: Application.InstallTab (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}  detected: Application.AdUpd (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}  detected: Application.AppInst (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\TYPELIB\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}  detected: Application.AdUpd (A
Key: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}  detected: Application.AppInst (A
C:\FRST\Quarantine\C\ProgramData\Origin\update.vbe.xBAD  detected: Trojan.Downloader.VBS.Agent.FP (B
C:\FRST\Quarantine\C\ProgramData\{3ae7d3bd-dec2-d72f-3ae7-7d3bddec4ef7}\microsoft-word-2013.exe  detected: Gen:Variant.Adware.Kazy.605162 (B
C:\FRST\Quarantine\C\Windows\Temp\svchost.exe.xBAD  detected: Application.Bitcoinminer.HH (B
C:\Users\User\Downloads\microsoft-word-2013.exe  detected: Gen:Variant.Adware.Kazy.605162 (B
C:\Windows\assembly\GAC_32\System.Data.SQLite\1.0.66.0__db937bc2d44ff139\System.Data.SQLite.dll  detected: Adware.Linkury.B (B
C:\Windows\assembly\GAC_MSIL\Interop.SHDocVw\1.1.0.0__84542ff99aed6a4d\Interop.SHDocVw.dll  detected: Adware.Linkury.B (B
D:\Eroge\BL Games\A B C\Birdie\birdiepatch.rar -> birdiepatch\birup102.exe -> (CAB Sfx o) -> BIRUP102.DTL  detected: Trojan.Upatre.Crypted.2 (B
D:\Eroge\BL Games\S T U\Shingakkou -Noli me tangere-\noDVDpatch.zip -> noDVDpatch/￧ᆬ゙¥ᆳᆭ₩ᅠᄀ.exe  detected: Gen:Variant.Adware.Mplug.39 (B
E:\Downloads\Borderlands.The.Pre.Sequel-RELOADED\rld-bothpr\Setup.exe  detected: Gen:Variant.Strictor.77127 (B
E:\Downloads\Borderlands.The.Pre.Sequel.Update.v1.0.2.Incl.DLC-RELOADED\Borderlands.The.Pre.Sequel.Update.v1.0.2.Incl.DLC-RELOADED.ALI213\Crack\Binaries\Win32\steam_api.dll  detected: Application.Agent.HF (B
E:\Downloads\The.Sims.4-RELOADED[rarbg]\rld-thesims4\Crack\Game\Bin\rld.dll  detected: Application.Crack.PED (B
E:\Games\Grand Theft Auto V\3dmgame.dll  detected: Packed.Win32.VMProtect (A)
H:\HDN\rld-hyperd\Crack\steam_api.dll  detected: Trojan.Generic.12702185 (B
H:\Photoshop\Adobe Photoshop CS6 Extended\DLL FILE\32bit\amtlib.dll  detected: Application.Win32.Agent (A
H:\Photoshop\Adobe Photoshop CS6 Extended\DLL FILE\64bit\amtlib.dll  detected: Riskware.Win32.CrackTool (A
H:\rld-thesims4\Crack\Game\Bin\rld.dll  detected: Application.Crack.PED (B
 
Scanned 1008344
Found 35
 
Scan end: 15/06/2015 10:24:24 PM
Scan time: 4:50:32


#8 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:33 AM

Posted 15 June 2015 - 03:56 PM

Hi,
 

 

STEP 1

 

 
Please download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.

 

 

 

STEP 2

 

 

Before I let you go I'd like to scan your machine with ESET OnlineScan.

Since Eset could take up to an hour or even more depending on the size of your hard drive and the speed of your computer I suggest that you run this scan at night when you are not there and the computer is idle.

 

 

  • Please download and the run exe from the link below:
    ESET OnlineScan
  • Check esetAcceptTerms.png
  • Click the esetStart.png button.
  • Accept any security warnings from your browser.
  • Check the option beside: Enable detection of potentially unwanted applications
  • Now click on Advanced Settings and make sure that the option Remove found threats is NOT checked, and select the following:
    • Scan archives
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth Technology
    • Click on the Change button and select only Operating memory and drive C:\

fhSji42.png

 

  • Push the Start button.
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, push esetListThreats.png
  • Push esetExport.png, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Push the esetBack.png button.
  • Push esetFinish.png

 

 

STEP 3

 

 

Also let's check for outdated and vulnerable software on your pc

 

 

Download Security Check by screen317 from here.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

 

and then if there aren't any issues left I'll give you my final recommendations.

Let me know for any remaining issues.


Regards,
Georgi


cXfZ4wS.png


#9 Fluens

Fluens
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:33 PM

Posted 16 June 2015 - 09:59 AM

I haven't noticed any issues with the initial infection, apart from what was just found everything is doing much better thanks!

 

FixLog

Fix result of Farbar Recovery Scan Tool (x64) Version:13-06-2015
Ran by User at 2015-06-16 14:32:32 Run:2
Running from C:\Users\User\Downloads
Loaded Profiles: User (Available Profiles: User)
Boot Mode: Normal
==============================================
 
fixlist content:
*****************
start
C:\Users\User\Downloads\microsoft-word-2013.exe
C:\Users\User\AppData\Roaming\getrighttogo
C:\ProgramData\EmailNotifier
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ytd video downloader
C:\ProgramData\ytd video downloader
C:\Windows\assembly\GAC_32\System.Data.SQLite\1.0.66.0__db937bc2d44ff139\System.Data.SQLite.dll
C:\Windows\assembly\GAC_MSIL\Interop.SHDocVw\1.1.0.0__84542ff99aed6a4d\Interop.SHDocVw.dll
DeleteKey: HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3}
DeleteKey: HKLM\SOFTWARE\Classes\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F}
DeleteKey: HKLM\SOFTWARE\Classes\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}
DeleteKey: HKLM\SOFTWARE\Classes\Record\{2009AF2F-5786-3067-8799-B97F7832FDD6}
DeleteKey: HKLM\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E}
DeleteKey: HKLM\SOFTWARE\Classes\Record\{915BB7D5-082E-3B91-B1E0-45B5FDE01F24}
DeleteKey: HKLM\SOFTWARE\Classes\Record\{FB2E65F4-5687-33EF-9BBF-4E3C9C98D3B9}
DeleteKey: HKLM\SOFTWARE\Classes\Wow6432Node\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F}
DeleteKey: HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113}
DeleteKey: HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}
DeleteKey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3152E1F19977892449DC968802CE8964
DeleteKey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\649A52D257CA5DB4EAAE8BA9EB23E467
DeleteKey: HKLM\SOFTWARE\Wow6432Node\Conduit
DeleteKey: HKLM\SOFTWARE\Wow6432Node\Email Notifier
DeleteKey: HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175}
DeleteKey: HKLM\SOFTWARE\Wow6432Node\SupDp
DeleteKey: HKLM\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
DeleteKey: HKU\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
DeleteKey: HKU\S-1-5-18\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
DeleteKey: HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
DeleteKey: HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}
DeleteKey: HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Conduit
DeleteKey: HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Smartbar
DeleteKey: HKU\S-1-5-21-558910080-3827423310-2547630886-1001_Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326}
DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96}
DeleteKey: HKEY_USERS\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\STARTSEARCH
DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB}
DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5}
DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\TYPELIB\{A2D733A7-73B0-4C6B-B0C7-06A432950B66}
DeleteKey: HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52}
end
*****************
 
C:\Users\User\Downloads\microsoft-word-2013.exe => moved successfully.
C:\Users\User\AppData\Roaming\getrighttogo => moved successfully.
C:\ProgramData\EmailNotifier => moved successfully.
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\ytd video downloader => moved successfully.
C:\ProgramData\ytd video downloader => moved successfully.
C:\Windows\assembly\GAC_32\System.Data.SQLite\1.0.66.0__db937bc2d44ff139\System.Data.SQLite.dll => moved successfully.
C:\Windows\assembly\GAC_MSIL\Interop.SHDocVw\1.1.0.0__84542ff99aed6a4d\Interop.SHDocVw.dll => moved successfully.
HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3} => key removed successfully
HKLM\SOFTWARE\Classes\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F} => key removed successfully
HKLM\SOFTWARE\Classes\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKLM\SOFTWARE\Classes\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113} => key removed successfully
HKLM\SOFTWARE\Classes\Record\{2009AF2F-5786-3067-8799-B97F7832FDD6} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKLM\SOFTWARE\Classes\Record\{2009AF2F-5786-3067-8799-B97F7832FDD6} => key removed successfully
HKLM\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKLM\SOFTWARE\Classes\Record\{425E7597-03A2-338D-B72A-0E51FFE77A7E} => key removed successfully
HKLM\SOFTWARE\Classes\Record\{915BB7D5-082E-3B91-B1E0-45B5FDE01F24} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKLM\SOFTWARE\Classes\Record\{915BB7D5-082E-3B91-B1E0-45B5FDE01F24} => key removed successfully
HKLM\SOFTWARE\Classes\Record\{FB2E65F4-5687-33EF-9BBF-4E3C9C98D3B9} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKLM\SOFTWARE\Classes\Record\{FB2E65F4-5687-33EF-9BBF-4E3C9C98D3B9} => key removed successfully
HKLM\SOFTWARE\Classes\Wow6432Node\AppID\{C007DADD-132A-624C-088E-59EE6CF0711F} => key not found. 
HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKLM\SOFTWARE\Classes\Wow6432Node\CLSID\{AE07101B-46D4-4A98-AF68-0333EA26E113} => key removed successfully
HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175} => key removed successfully
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\3152E1F19977892449DC968802CE8964 => key removed successfully
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\649A52D257CA5DB4EAAE8BA9EB23E467 => key removed successfully
HKLM\SOFTWARE\Wow6432Node\Conduit => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKLM\SOFTWARE\Wow6432Node\Conduit => key removed successfully
HKLM\SOFTWARE\Wow6432Node\Email Notifier => key removed successfully
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{0C5365B7-358F-402d-A440-F1270AEF1175} => key removed successfully
HKLM\SOFTWARE\Wow6432Node\SupDp => key removed successfully
HKLM\SOFTWARE\Wow6432Node\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0} => key removed successfully
HKU\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKU\.DEFAULT\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} => key removed successfully
HKU\S-1-5-18\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} => key not found. 
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA} => key removed successfully
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326} => key removed successfully
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Conduit => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Conduit => key removed successfully
HKU\S-1-5-21-558910080-3827423310-2547630886-1001\Software\Smartbar => key removed successfully
HKU\S-1-5-21-558910080-3827423310-2547630886-1001_Classes\Wow6432Node\Interface\{3B3F3AAD-FB97-49FF-BFEE-D22869AC4326} => key not found. 
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{6E993643-8FBC-44FE-BC85-D318495C4D96} => key removed successfully
HKEY_USERS\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\STARTSEARCH => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKEY_USERS\S-1-5-21-558910080-3827423310-2547630886-1001\SOFTWARE\STARTSEARCH => key removed successfully
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{4E6354DE-9115-4AEE-BD21-C46C3E8A49DB} => key removed successfully
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{FC073BDA-C115-4A1D-9DF9-9B5C461482E5} => key removed successfully
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\TYPELIB\{A2D733A7-73B0-4C6B-B0C7-06A432950B66} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\TYPELIB\{A2D733A7-73B0-4C6B-B0C7-06A432950B66} => key removed successfully
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52} => could not remove at first attempt (ErrorCode: C0000121), see next line.
HKEY_LOCAL_MACHINE\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52} => key removed successfully
 
==== End of Fixlog 14:32:32 ====

 

ESET

C:\FRST\Quarantine\C\ProgramData\Origin\update.vbe.xBAD VBS/Kryptik.DC trojan
C:\FRST\Quarantine\C\ProgramData\{3ae7d3bd-dec2-d72f-3ae7-7d3bddec4ef7}\microsoft-word-2013.exe a variant of Win32/Adware.MultiPlug.JS application
C:\FRST\Quarantine\C\Users\User\Downloads\microsoft-word-2013.exe.xBAD a variant of Win32/Adware.MultiPlug.JS application
C:\FRST\Quarantine\C\Windows\assembly\GAC_MSIL\Interop.SHDocVw\1.1.0.0__84542ff99aed6a4d\Interop.SHDocVw.dll.xBAD a variant of Win32/Toolbar.Linkury.G potentially unwanted application
C:\FRST\Quarantine\C\Windows\Temp\svchost.exe.xBAD Win64/CoinMiner.J trojan
C:\Program Files (x86)\Google\Chrome\Application\43.0.2357.81\chrome.dll Win32/Patched.NGD trojan
C:\Users\User\Desktop\bleep\SHeetmusic\switchsetup.exe a variant of Win32/Toolbar.Conduit.H potentially unwanted application
C:\Users\User\Downloads\winzip19-cnet.exe a variant of Win32/InstallCore.PL potentially unwanted application
C:\Windows\Installer\MSID246.tmp a variant of Win32/Bundled.Toolbar.Ask.F potentially unsafe application

 

 

Security Check

 Results of screen317's Security Check version 1.004  
   x64 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Firewall Enabled!  
Windows Defender   
 WMI entry may not exist for antivirus; attempting automatic update. 
`````````Anti-malware/Other Utilities Check:````````` 
 Java™ 6 Update 43  
 Java version 32-bit out of Date! 
  Adobe Flash Player 17.0.0.188 Flash Player out of Date!  
 Adobe Reader XI  
 Mozilla Firefox 34.0.5 Firefox out of Date!  
 Google Chrome (43.0.2357.124) 
 Google Chrome (43.0.2357.81) 
````````Process Check: objlist.exe by Laurent````````  
 Windows Defender MSMpEng.exe 
 Malwarebytes Anti-Malware mbam.exe  
 Windows Defender MpCmdRun.exe   
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:  % 
````````````````````End of Log`````````````````````` 


#10 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:33 AM

Posted 16 June 2015 - 05:01 PM

Hi,

 

 

To remove the malware remnants please do this:
 
 
Please download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.
 

Also no wonder your computer was infected. You use a lot of cracks. This is playing with fire though.

Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications.

Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems.

So my advice is - stay away from them! Bitcoin miners are usually integrated into installers of game repacks so This is how your computer was most likely infected.

 

GOG or Steam offers a lot of discounts and I would recommend you to purchase the games you like and delete the pirated files from your hdd immediately:

 

D:\Eroge\BL Games\A B C\Birdie\birdiepatch.rar -> birdiepatch\birup102.exe -> (CAB Sfx o) -> BIRUP102.DTL  detected: Trojan.Upatre.Crypted.2
D:\Eroge\BL Games\S T U\Shingakkou -Noli me tangere-\noDVDpatch.zip -> noDVDpatch/￧ᆬ゙¥ᆳᆭ₩ᅠᄀ.exe  detected: Gen:Variant.Adware.Mplug.39
E:\Downloads\Borderlands.The.Pre.Sequel-RELOADED\rld-bothpr\Setup.exe  detected: Gen:Variant.Strictor.77127
E:\Downloads\Borderlands.The.Pre.Sequel.Update.v1.0.2.Incl.DLC-RELOADED\Borderlands.The.Pre.Sequel.Update.v1.0.2.Incl.DLC-RELOADED.ALI213\Crack\Binaries\Win32\steam_api.dll  detected: Application.Agent.HF
E:\Downloads\The.Sims.4-RELOADED[rarbg]\rld-thesims4\Crack\Game\Bin\rld.dll  detected: Application.Crack.PED
E:\Games\Grand Theft Auto V\3dmgame.dll  detected: Packed.Win32.VMProtect
H:\HDN\rld-hyperd\Crack\steam_api.dll  detected: Trojan.Generic.12702185
H:\Photoshop\Adobe Photoshop CS6 Extended\DLL FILE\32bit\amtlib.dll  detected: Application.Win32.Agent
H:\Photoshop\Adobe Photoshop CS6 Extended\DLL FILE\64bit\amtlib.dll  detected: Riskware.Win32.CrackTool
H:\rld-thesims4\Crack\Game\Bin\rld.dll  detected: Application.Crack.PED

 

 

 

I have a few updating tasks for you:

 

 

Your Java is out of date. Older versions have vulnerabilities that malware can use to infect your system. Please follow these steps to remove older version of Java components and upgrade the application.
  • Download the latest version of Java SE 8.
  • Click the Java SE 8u45 "Download JRE" button to the right.
  • Select your Platform, Register and check the box that says: "I agree to the Java SE Runtime Environment 8 License Agreement.".
  • Click on Continue.
  • Click on the link to download Windows Offline Installation (jre-8u45-windows-i586.exe) and save it to your desktop. Do NOT use the Sun Download Manager..
  • Close any programs you may have running - especially your web browser.
  • Go to Start > Control Panel > Programs, click on Uninstall a program and remove all older versions of Java:
    Java™ 6 Update 43
  • Check any item with Java Runtime Environment (JRE or J2SE) in the name.
  • Click the Remove or Change/Remove button.
  • Repeat as many times as necessary to remove each Java version.
  • Reboot your computer once all Java components are removed.
  • Then from your desktop double-click on the download to install the newest version. (Vista/Windows 7 users, right click on the jre-8u40-windows-i586.exe and select "Run as an Administrator.")

 

Next please run JavaRa.

  • Please download JavaRa 2.6 and unzip it to your desktop.
  • Double-click on JavaRa.exe to start the program.
  • Choose Remove JRE and since you already uninstalled JAVA skip step 1 and click on the next button.
  • Now click on Perform Removal Routine to remove the older versions of Java installed on your computer.
  • When that's successfully done, please click OK to close the message.
  • Click on Next and skip the downloading process. Click Next and now click on Close this wizard and click Finish.
  • From the main menu please choose Additional tasks
  • Place a checkmark beside Remove startup entry, Remove Outdated JRE Firefox Extentions and Clean JRE Temp Files and click Run. The browsers should be closed before running this task.
  • When that's succesfully done you will see a message at the top saying: "Selected tasks completed successfully".
  • A log file should be created in the same directory as JavaRa.
  • Please attach the log to your next reply.
  • Close JavaRa by clicking the red cross button.

 

You can choose between 2 variants:

 

1. If you have applications that require Java to be installed on the computer then uninstall the old version of Java and then run JavaRa to remove all remnants and then go ahead and download & install the latest version of Java (Java SE 8).

 

2. If you want to be on the safe side then go ahead and uninstall the old version of Java, then run JavaRa to remove all remnants and then remove all applications that require Java (time to learn to live without Java and find alternatives to the applications that require Java)... Check this article.

 

 

Your Adobe Reader is out of date.
Older versions may have vulnerabilities that malware can use to infect your system.
Please download Adobe Acrobat Reader DC 2015.007.20033 to your PC's desktop.

Note that the McAfee Security Scan is prechecked. You may wish to uncheck it before downloading.
 

  • Uninstall Adobe Reader XI via Start => Control Panel > Uninstall a program
  • Install the new downloaded updated software.

 

 

Your Adobe Flash Player is out of date!

Older versions may have vulnerabilities that malware can use to infect your system.

 

software.gif Please download and install: Adobe Flash Player 18.0.0.160 Final for (Internet Explorer)
software.gif Please download and install: Adobe Flash Player 18.0.0.160 Final for (Firefox, Safari, Opera)

 

Note: Your browsers should be closed before proceeding with the installation process.

 

 

 

Your Mozilla Firefox is out of date!
Download and install the latest version Mozilla Firefox 38.0.6 Final

Do a backup of your existing profile using Mozbackup or FEBE before you proceed with the update (just in case).

 

 

  • The securitycheck log shows that the rest of your critical programs are up to date but It is possible for other programs on your computer to have security vulnerability that can allow malware to infect you.
  • Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities.
  • You can check these by visiting Secunia Software Inspector or you can use the following application for this purpose PatchMyPC

 

 
Visit Microsoft's Windows Update Site Frequently

 

  • It is important that you visit Windows Update regularly.
  • This will ensure your computer has always the latest security updates available installed on your computer.
  • If there are new updates to install, install them immediately, reboot your computer, and revisit the site until there are no more critical updates.

 

 

Thank you for following my instructions perfectly! :bounce:

 

 

Now that we are at the end of our journey I have some final words for you. :)
All Clean !
Your machine appears to be clean, please take the time to read below on how to secure the machine and take the necessary steps to keep it Clean.

 

 

 

STEP 1 - CLEANUP


Here are a few additional steps on how to remove all of the tools we used as promised:

 

 

Download the following file => and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST/FRST64 and press the Fix button just once and wait.
It's no needed to post the log this time.

 

  • Next please download Delfix.exe by Xplode and save it to your desktop.
  • Please start it and check the box next to "Remove disinfection tools" and uncheck the rest and click on the run button.
  • The tool will delete itself once it finishes.

 

Note: If any tool, file, log file or folder (belonging to the program we have used) hasn't been deleted, please delete it manually.

 

 

 

STEP 2 - SECURITY ADVICES


Change all your passwords !


Since your computer was infected for peace of mind, I would however advise you that all (or as much possible) your passwords be changed including those for bank accounts, credit cards and home loans, PIN codes etc) just in case.

 

Many of the modern malware samples have backdoor abilities and can steal confidential information from the compromised computer. Also you should check for any suspicious transactions if such occur. If you find out that you have been victim to fraud contact your bank or the appropriate institution for assistance.
Use different passwords for all your accounts. Also don't use easy passwords such as your favorite teams, bands or pets because this will allow people to guess your password.
You can use Password Generator - Norton Identity Safe to create random passwords and then install an application like KeePass Password Safe to store them for easy access. If you do Online Banikng please read this article: Online Banking Protection Against Identity Theft

 

If you're storing passwords in the browser to access websites than they are non encrypted well. Only if you use Firefox with master password protection, this provide better security. You can add Secure Login to prevent Java and other exploits when log-in.

 

 

Keep your antivirus software turned on and up-to-date

 

 

  • New viruses come out every minute, so it is essential that you have the latest signatures for your antivirus program to provide you with the best possible protection from malicious software.
  • Note: You should only have one antivirus installed at a time. Having more than one antivirus program installed at once is likely to cause conflicts and may well decrease your overall protection as well as impairing the performance of your PC.
  • Note: You should scan your computer with an antimalware program like Malwarebytes' Anti-Malware on a regular basis just as you would an antivirus software.
  • Be sure to check for and download any definition updates prior to performing a scan.
  • Also keep in mind that MBAM is not a replacement for antivirus software, it is meant to complement the protection provided by a full antivirus product and is designed to detect the threats that are missed by most antivirus software.

 

 

Be prepared for CryptoLocker and similar threats:
 

 

Check the article below for more information:

The ascension of Crypto-Ransomware and what you need to know to protect yourself

 

Since the prevention is better than cure you can use CryptoPrevent (described in the link above) to secure the PC against these lockers. Keep in mind that if you choose high protection level in CryptoPrevent then you can encounter some problems with the installed applications. You may need to lower the protection level if you encounter such problems or to add the entries to the whitelist:

 

mtBkCIZ.jpg

 

I would not recommend you to use the latest option which is still in BETA. Many programs will not work when the Maximum Protection + Program Filtering (BETA) setting is activated...

 

Also you may need to disable the protection sometimes before you can install new software or apply updates and when you are done then you need to re-apply the protection. It can be very annoying, but still better than losing all of the documents because of Cryptolocker and his variants.

 

 

Also a new tool was created to help prevention of ransomware called CryptoMonitor. You can take a look at it if you want. smile.png

 

 

Install HIPS based software if needed (or use Limited Account with UAC enabled)

 

 

I usually recommend to users to install HIPS based software (like Comodo Firewall, Emsisoft Anti-Malware, PrivateFirewall or Outpost Security Suite FREE) to prevent an unknown malware from gaining access but this type software is only effective in the right hands since it require from the users to take the right decisions.

It takes some time and knowledge to configure it for individual purposes but once done, you should not have a problems with it.
There are so many reviews on YouTube and blogs about all these programs.
More information about HIPS can be found here: What is Host Intrusion Prevention System (HIPS) and how does it work?

 

 

Comodo Firewall/Internet Security can protect the data if you add all local disks to Protected Files and Folders but if you decide to use it then keep in mind to disable  Windows Defender first!

 

 

Panda have an option (similar to this offered by Comodo) called Data Shield which can help you to protect your data against ransomware.

What is the Data Shield protection of Panda 2015? but if you choose to stick to Panda then you should disable Windows Defender first and also keep in mind that the software is shareware.

 

 

Emsisoft Anti-Malware can deal with them using its behavior blocker.

 

 

If these kind of programs are difficult for you to use then you can use a standard user account with UAC enabled. If you need administrative privileges to perform some tasks, then you can use Run As or log on as the administrator account for that specific task.

 


However using such programs on business computers can be very difficult since the users will receive a lot of pop-ups with questions and probably will be impossible for them to work in a efficient way...

 

 

You may want to check Malwarebytes Anti-Exploit and add install it to be safe when surfing the net. It work with the most popular browsers and it is very effective. See the article here.

 

 

There are other programs worth checking like Sandboxie, HitmanPro.Alert, SecureAplus (offer ClamWin - be sure to uncheck it during install if you have another AV installed), VoodooShield (similar to SecureAplus but does not offer ClamWin antivirus), Emet, Toolwiz Time Freeze, KeyScrambler Personal etc, but they are too complicated for the average user. However, you can take a look at them if have the time to learn how to use them.

 

 

Keep in mind to choose carefully in order to avoid conflicts or instability caused by incompatible security programs.
Also having more than one "real-time" program can be a drain on your PC's efficiency so please refrain doing so.

 

 

 

Practice Safe Internet


One of the main reasons people get infected in the first place is that they are not practicing Safe Internet. You practice Safe Internet when you educate yourself on how to properly use the Internet through the use of security tools and good practice. Knowing how you can get infected and what types of files and sites to avoid will be the most crucial step in keeping your computer malware free. The reality is that the majority of people who are infected with malware are ones who click on things they shouldn't be clicking on. Whether these things are files or sites it doesn't really matter. If something is out to get you, and you click on it, it most likely will.  Below are a list of simple precautions to take to keep your computer clean and running securely:

  • If you receive an attachment from someone you do not know, DO NOT OPEN IT! Simple as that.  Opening attachments from people you do not know is a very common method for viruses or worms to infect your computer.
  • .zip, .exe, .com, .bat, .pif, .scr, .cmd, .cab or .vbs do not open the attachment unless you know for a fact that it is clean. For the casual computer user, you will almost never receive a valid attachment of this type.
  • If you receive an attachment from someone you know, and it looks suspicious, then it probably is.  The email could be from someone you know infected with a malware that is trying to infect everyone in their address book.
  • If you are browsing the Internet and a popup appears saying that you are infected, ignore it!. These are, as far as I am concerned, scams that are being used to scare you into purchasing a piece of software. For an example of these types of popups, or Foistware, you should read this article:
    Foistware, And how to avoid it. There are also programs that disguise themselves as Anti-Spyware or security products but are instead scams.  For a list of these types of programs we recommend you visit this link: About Malwares, Rogues, Scarewares, SmitfraudFix
  • Another tactic to fool you on the web is when a site displays a popup that looks like a normal Windows message  or alert. When you click on them, though, they instead bring you to another site that is trying to push a product on you.  We suggest that you close these windows by clicking on the X instead of the OK button. Alternatively, you can check to see if it's a real alert by right-clicking on the window.  If there is a menu that comes up saying Add to Favorites... you know it's a fake.
  • Do not go to adult sites. I know this may bother some of you, but the fact is that a large amount of malware is pushed through these types of sites. I am not saying all adult sites do this, but a lot do.
  • When using an Instant Messaging program be cautious about clicking on links people send to you. It is not uncommon for infections to send a message to everyone in the infected person's contact list that contains a link to an infection. Instead when you receive a message that contains a link, message back to the person asking if it is legit before you click on it.
  • Stay away from Warez and Crack sites! In addition to the obvious copyright issues, the downloads from these sites are typically overrun with infections. Avoid using cracks and unknown programs from sources you don't trust. There are MANY alternative open-source applications. Malware writers just love cracks and keygens, and will often attach malicious code into them. By using cracks and/or keygens, you are asking for problems. So my advice is - stay away from them!
  • Be careful of what you download off of web sites and Peer-2-Peer networks. Some sites disguise malware as legitimate software to trick you into installing them and Peer-2-Peer networks are crawling with it. If you want to download a piece of software a from a site, and are not sure if they are legitimate, you can use Bitdefender TrafficLight or Avira Browser Safety to look up info on the site. Note: skip this advice if your antivirus have a Web Guard.
  • DO NOT INSTALL any software without first reading the End User License Agreement, otherwise known as the EULA. A tactic that some developers use is to offer their software for free, but have spyware and other programs you do not want bundled with it. This is where they make their money. By reading the agreement there is a good chance you can spot this and not install the software.
  • You may want to install unchecky to prevent adware bundled into many free programs to install. Please keep in mind that this program is a beta version of a product and not completely tested to ensure its stability or reliability.

 

 

Tweak your browsers
 

MOZILLA FIREFOX

 

To prevent further infections be sure to install the following add-ons AdBlock Plus

 

Adblock Plus hides all those annoying (and potentially dangerous) advertisements on websites that try and tempt you to buy or download something. AdBlock not only speeds up your browsing and makes it easier on your eyes, but also makes it safer.

 

Adblock Plus can be found here.
 
Do not add to many filters subscriptions because it will slow down your browser startup time. Also keep in mind to uncheck the box beside "Allow some non-intrusive advertising" as well.
 
erfxUim.jpg

 

 

You can take a look at NoScript as well but NoScript is only for advanced users as it blocks all the interactive parts of a webpage, such as login options. Obviously you wouldn’t want to block your ability to log on to your internet banking or your webmail, but thankfully you can tell NoScript to allow certain websites and block others. This is very useful to ensure that the website you’re visiting is not trying to tempt you to interact with another, more dangerous website.

 

You can download it from here
You can find the optimal settings here
A tutorial on how to use it can be found here

 

 

Ad-Muncher is now free so you can give it a try as well.

 

 

 

Google Chrome

 
If you like Google Chrome there are many similar extensions for this browser as well. Since I am not a Google Chrome user I can't tell you which of them are good and how they work. You should find out by yourself.

However Google Chrome can block a lot of unknown malware because of his sandbox.Beware of the fact that Google Chrome doesn't provide master password protection for your saved in the browser passwords. Check this out: Google Chrome security flaw offers unrestricted password access


 
For Internet Explorer read the article below:


Security and privacy features in Internet Explorer

 

 

Also you can change your DNS settings with these 8.26.56.26 and 8.20.247.20 to use Comodo Secure DNS for free (to prevent phishing attacks). Sometime the DNS servers may be overloaded by the traffic coming from other networks and then you can lose your internet connection. In that case you can switch back to your ISP DNS again.

 

 

Make the extensions for known file types visible:
 
 
Be wary of files with a double extension such as image.jpg.exe. As a default setting, Windows often hides common file extensions, meaning that a program like image.jpg.exe will appear to you as simply image.jpg. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first one.Check this out - Show or hide file name extensions.


 
Disable Autorun and Windows Scripting Host:
 
 
It's a good idea to disable the Autorun functionality to prevent spreading of the infections from USB flash drives.

Check the article here for more information.

 

If you don't use any script files then you can go ahead and disable Windows Scripting Host using the tool provided by Symantec - NoScript.exe. Simple download and run it and click on the Disable button and reboot the computer. If you need to run any js. or vbs scripts at a later stage you should run NoScript again and select Enable, then reboot the computer.
 

 

 
Create an image of your system (you can use the built-in Windows software as well if you prefer)

  • Now when your pc is malware free it is a good idea to do a backup of all important files just in case something happens it.
  • Macrium Reflect is very good choice that enables you to create an image of your system drive which can be restored in case of problems.
  • The download link is here.
  • The tutorial on how to create an system image can be found here.
  • The tutorial on how to restore an system image can be found here.
  • Be sure to read the tutorial first.

 

 

Follow this list and your potential for being infected again will reduce dramatically.

 

Safe Surfing ! :)

 

Regards,

Georgi


cXfZ4wS.png


#11 Fluens

Fluens
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:07:33 PM

Posted 16 June 2015 - 11:39 PM

FIXLOG
C:\FRST\Quarantine\C\ProgramData\Origin\update.vbe.xBAD VBS/Kryptik.DC trojan
C:\FRST\Quarantine\C\ProgramData\{3ae7d3bd-dec2-d72f-3ae7-7d3bddec4ef7}\microsoft-word-2013.exe a variant of Win32/Adware.MultiPlug.JS application
C:\FRST\Quarantine\C\Users\User\Downloads\microsoft-word-2013.exe.xBAD a variant of Win32/Adware.MultiPlug.JS application
C:\FRST\Quarantine\C\Windows\assembly\GAC_MSIL\Interop.SHDocVw\1.1.0.0__84542ff99aed6a4d\Interop.SHDocVw.dll.xBAD a variant of Win32/Toolbar.Linkury.G potentially unwanted application
C:\FRST\Quarantine\C\Windows\Temp\svchost.exe.xBAD Win64/CoinMiner.J trojan
C:\Program Files (x86)\Google\Chrome\Application\43.0.2357.81\chrome.dll Win32/Patched.NGD trojan
C:\Users\User\Desktop\bleep\SHeetmusic\switchsetup.exe a variant of Win32/Toolbar.Conduit.H potentially unwanted application
C:\Users\User\Downloads\winzip19-cnet.exe a variant of Win32/InstallCore.PL potentially unwanted application
C:\Windows\Installer\MSID246.tmp a variant of Win32/Bundled.Toolbar.Ask.F potentially unsafe application
 
 
Thank you for all of your help, I will follow your recommendations and advice in the future!
Many thanks Rob.


#12 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:33 AM

Posted 17 June 2015 - 01:12 AM

Hi Rob,

 

You posted the Eset log instead of the fixlog.txt.

If you already deleted the tools we used then be sure to delete these manually if they are still there:

 

C:\Program Files (x86)\Google\Chrome\Application\43.0.2357.81\chrome.dll => this file
C:\Users\User\Desktop\bleep\SHeetmusic\switchsetup.exe => this file
C:\Users\User\Downloads\winzip19-cnet.exe => this file
C:\Windows\Installer\MSID246.tmp => this file
 
or run the batch file and it will delete them for you =>
 
 
 
Take care!
 
 
Regards,
Georgi

cXfZ4wS.png


#13 B-boy/StyLe/

B-boy/StyLe/

    Bleepin' Freestyler


  • Malware Response Team
  • 8,283 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Bulgaria
  • Local time:11:33 AM

Posted 18 June 2015 - 03:14 AM

It appears that this issue is resolved, therefore I am closing the topic. If that is not the case and you need or wish to continue with this topic, please send me or any Moderator a Personal Message (PM) that you would like this topic re-opened.

cXfZ4wS.png





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users