Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Rootkit? help!


  • This topic is locked This topic is locked
3 replies to this topic

#1 kinojk2

kinojk2

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:04:43 PM

Posted 14 October 2016 - 09:04 AM

Hi, 

 

Please find my combofix log, and my GMER scan results. Any advice would be greatly appreciated, I've already 0'd my drives, replaced memory. havent been able shake this damn thing. If it's even there...I'm not sure if I've succesfuly cleaned it or not. But I'm still very paranoid after the horrendous amount of junk I found on my PC after finally realising my norton 360 had been compromised or hadn't worked for a year or so. 

 

 

Just before posting I had 3 copies of chrome running in task manager, yet I only have one chrome actually open. It also took forever to submit this post despite my internet connection being incredibly fast..

 

Combo Fix:


ComboFix 16-09-28.01 - kno 14/10/2016  14:51:01.1.4 - x64
Microsoft Windows 7 Ultimate   6.1.7601.1.1252.44.1033.18.8137.5810 [GMT 1:00]
Running from: c:\users\kno\Downloads\ComboFix.exe
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2016-09-14 to 2016-10-14  )))))))))))))))))))))))))))))))
.
.
2016-10-14 16:50 . 2016-10-14 08:03 -------- d-----w- c:\windows\Panther
2016-10-14 13:53 . 2016-10-14 13:53 -------- d-----w- c:\users\Default\AppData\Local\temp
2016-10-14 13:36 . 2016-10-14 13:36 -------- d-sh--w- c:\windows\Installer
2016-10-14 13:31 . 2016-10-14 13:31 -------- d-----w- c:\program files (x86)\Google
2016-10-14 08:12 . 2016-10-14 08:12 74272 ----a-w- c:\windows\system32\RtNicProp64.dll
2016-10-14 08:12 . 2016-10-14 08:12 565352 ----a-w- c:\windows\system32\drivers\Rt64win7.sys
2016-10-14 08:12 . 2016-10-14 08:12 107552 ----a-w- c:\windows\system32\RTNUninst64.dll
2016-10-14 08:12 . 2016-10-14 08:12 -------- d-----w- c:\program files (x86)\Realtek
2016-10-14 08:12 . 2016-10-14 08:12 -------- d--h--w- c:\program files (x86)\InstallShield Installation Information
2016-10-14 08:03 . 2016-10-14 08:03 -------- d-----w- c:\users\kno
2016-10-14 08:03 . 2016-10-14 08:03 -------- d-----w- C:\Recovery
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
.
R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys;c:\windows\SYSNATIVE\drivers\dmvsc.sys [x]
R3 MFE_RR;MFE_RR;c:\users\kno\AppData\Local\Temp\mfe_rr.sys;c:\users\kno\AppData\Local\Temp\mfe_rr.sys [x]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys;c:\windows\SYSNATIVE\drivers\rdpvideominiport.sys [x]
R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys;c:\windows\SYSNATIVE\drivers\synth3dvsc.sys [x]
R3 terminpt;Microsoft Remote Desktop Input Driver;c:\windows\system32\drivers\terminpt.sys;c:\windows\SYSNATIVE\drivers\terminpt.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys;c:\windows\SYSNATIVE\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys;c:\windows\SYSNATIVE\drivers\TsUsbGD.sys [x]
R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys;c:\windows\SYSNATIVE\drivers\tsusbhub.sys [x]
R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys;c:\windows\SYSNATIVE\drivers\rdvgkmd.sys [x]
S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys;c:\windows\SYSNATIVE\DRIVERS\Rt64win7.sys [x]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MFE_RR
*NewlyCreated* - UWLDQPOW
*Deregistered* - uwldqpow
.
Contents of the 'Scheduled Tasks' folder
.
2016-10-14 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2016-10-14 13:31]
.
2016-10-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2016-10-14 13:31]
.
.
--------- X64 Entries -----------
.
.
------- Supplementary Scan -------
.
uLocal Page = c:\windows\system32\blank.htm
mLocal Page = c:\windows\SysWOW64\blank.htm
TCP: DhcpNameServer = 192.168.0.22
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2016-10-14  14:54:21
ComboFix-quarantined-files.txt  2016-10-14 13:54
.
Pre-Run: 94,038,249,472 bytes free
Post-Run: 93,924,679,680 bytes free
.
- - End Of File - - 4638731CA0E84FEA23121A3F8DC758C1
A36C5E4F47E84449FF07ED3517B43A31
 

 

 

GMER:

 

GMER 2.2.19882 - http://www.gmer.net
Rootkit scan 2016-10-14 15:03:58
Windows 6.1.7601 Service Pack 1 x64 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP5T0L0-9 KINGSTON_SV300S37A120G rev.506ABBF0 111.79GB
Running: gmer.exe; Driver: C:\Users\kno\AppData\Local\Temp\uwldqpow.sys
 
 
---- User code sections - GMER 2.2 ----
 
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2528] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection                                                                               0000000077201590 14 bytes {MOV RAX, 0x7fef7458d54; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread                                                                           00000000772013e0 7 bytes [48, B8, FC, 0E, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread + 8                                                                       00000000772013e8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken                                                                                0000000077201550 7 bytes [48, B8, 70, 0F, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken + 8                                                                            0000000077201558 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess                                                                                    0000000077201570 7 bytes [48, B8, 1C, 13, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess + 8                                                                                0000000077201578 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationFile                                                                             0000000077201580 7 bytes [48, B8, 20, 11, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationFile + 8                                                                         0000000077201588 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection                                                                               0000000077201590 7 bytes [48, B8, E0, 0D, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection + 8                                                                           0000000077201598 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection                                                                             00000000772015b0 7 bytes [48, B8, 4C, 0E, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection + 8                                                                         00000000772015b8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx                                                                              0000000077201600 7 bytes [48, B8, E0, 0F, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx + 8                                                                          0000000077201608 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessTokenEx                                                                             0000000077201610 7 bytes [48, B8, 58, 13, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessTokenEx + 8                                                                         0000000077201618 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile                                                                                       0000000077201640 7 bytes [48, B8, C4, 10, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile + 8                                                                                   0000000077201648 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile                                                                            00000000772016e0 7 bytes [48, B8, F8, 10, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile + 8                                                                        00000000772016e8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile                                                                                     0000000077201860 7 bytes [48, B8, 50, 10, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile + 8                                                                                 0000000077201868 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken                                                                               00000000772022d0 7 bytes [48, B8, 40, 13, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken + 8                                                                           00000000772022d8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread                                                                                     0000000077202320 7 bytes [48, B8, F8, 12, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread + 8                                                                                 0000000077202328 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile                                                                        0000000077202470 7 bytes [48, B8, 0C, 11, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile + 8                                                                    0000000077202478 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread                                                                           00000000772013e0 7 bytes [48, B8, FC, 0E, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationThread + 8                                                                       00000000772013e8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken                                                                                0000000077201550 7 bytes [48, B8, 70, 0F, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadToken + 8                                                                            0000000077201558 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess                                                                                    0000000077201570 7 bytes [48, B8, 1C, 13, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcess + 8                                                                                0000000077201578 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationFile                                                                             0000000077201580 7 bytes [48, B8, 20, 11, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtSetInformationFile + 8                                                                         0000000077201588 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection                                                                               0000000077201590 7 bytes [48, B8, E0, 0D, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtMapViewOfSection + 8                                                                           0000000077201598 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection                                                                             00000000772015b0 7 bytes [48, B8, 4C, 0E, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtUnmapViewOfSection + 8                                                                         00000000772015b8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx                                                                              0000000077201600 7 bytes [48, B8, E0, 0F, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThreadTokenEx + 8                                                                          0000000077201608 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessTokenEx                                                                             0000000077201610 7 bytes [48, B8, 58, 13, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessTokenEx + 8                                                                         0000000077201618 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile                                                                                       0000000077201640 7 bytes [48, B8, C4, 10, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenFile + 8                                                                                   0000000077201648 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile                                                                            00000000772016e0 7 bytes [48, B8, F8, 10, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtQueryAttributesFile + 8                                                                        00000000772016e8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile                                                                                     0000000077201860 7 bytes [48, B8, 50, 10, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtCreateFile + 8                                                                                 0000000077201868 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken                                                                               00000000772022d0 7 bytes [48, B8, 40, 13, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenProcessToken + 8                                                                           00000000772022d8 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread                                                                                     0000000077202320 7 bytes [48, B8, F8, 12, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtOpenThread + 8                                                                                 0000000077202328 6 bytes {ADD [RAX], AL; JMP RAX}
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile                                                                        0000000077202470 7 bytes [48, B8, 0C, 11, D3, 3F, 01]
.text  C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] C:\Windows\SYSTEM32\ntdll.dll!NtQueryFullAttributesFile + 8                                                                    0000000077202478 6 bytes {ADD [RAX], AL; JMP RAX}
 
---- User IAT/EAT - GMER 2.2 ----
 
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!CloseServiceHandle]                                                              [7feebc56000] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!OpenSCManagerW]                                                                  [7feebc56760] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!StartServiceW]                                                                   [7feebc569b4] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!OpenServiceW]                                                                    [7feebc56778] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[2872] @ C:\Windows\system32\DWrite.dll[ntdll.dll!NtAlpcConnectPort]                                                                  [7feeae09354] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!CloseServiceHandle]                                                              [7feebc56000] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!OpenSCManagerW]                                                                  [7feebc56760] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!StartServiceW]                                                                   [7feebc569b4] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] @ C:\Windows\system32\DWrite.dll[ADVAPI32.dll!OpenServiceW]                                                                    [7feebc56778] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] @ C:\Windows\system32\DWrite.dll[ntdll.dll!NtAlpcConnectPort]                                                                  [7feeae09354] C:\Program Files (x86)\Google\Chrome\Application\54.0.2840.59\chrome_child.dll
IAT    C:\Program Files (x86)\Google\Chrome\Application\chrome.exe[3248] @ C:\Users\kno\AppData\Local\Google\Chrome\User Data\PepperFlash\23.0.0.185\pepflashplayer.dll[KERNEL32.dll!CreateNamedPipeW]  [770b002c] 
 
---- EOF - GMER 2.2 ----

 

 

Thanks guys!!

Edited by kinojk2, 14 October 2016 - 09:06 AM.


BC AdBot (Login to Remove)

 


#2 kinojk2

kinojk2
  • Topic Starter

  • Members
  • 3 posts
  • OFFLINE
  •  
  • Local time:04:43 PM

Posted 14 October 2016 - 11:52 AM

I've also ran hijack this: 

 

Please help us improve HijackThis by reporting this error
 
Click 'Yes' to submit
 
Error Details: 
 
An unexpected error has occurred at procedure: modBackup_MakeBackup(sItem=O16 - DPF: {5AE58FCF-6F6A-49B2-B064-02492C66E3F4} (MUCatalogWebControl Class) - http://catalog.update.microsoft.com/v7/site/ClientControl/en/x86/MuCatalogWebControl.cab?1476451935581)
Error #5 - Invalid procedure call or argument
 
Windows version: Windows NT 6.01.3505
MSIE version: 8.0.7601.17514
HijackThis version: 2.0.5
 
 
I'm trying everything but I cant understand enough and i dont know what to do. It seems likely ive been infected with some sophisticated stuff.


#3 nasdaq

nasdaq

  • Malware Response Team
  • 40,211 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:43 AM

Posted 16 October 2016 - 09:29 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===


Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).
  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.
POST THE LOG FOR MY REVIEW.

Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.

===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the LogFile button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleanerCx.txt (x is a number).
===

Download the version of this tool for your operating system.
Farbar Recovery Scan Tool (64 bit)
Farbar Recovery Scan Tool (32 bit)
and save it to a folder on your computer's Desktop.
Double-click to run it. When the tool opens click Yes to disclaimer.
Press Scan button.
It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.

How to attach a file to your reply:
In the Reply section in the bottom of the topic Click the "more reply Options" button.
attachlogs.png

Attach the file.
Select the "Choose a File" navigate to the location of the File.
Click the file you wish to Attach.

Click the Add reply button.
===

Please post the logs.

Let me know what problems persists.

#4 nasdaq

nasdaq

  • Malware Response Team
  • 40,211 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:11:43 AM

Posted 22 October 2016 - 09:41 AM

Due to the lack of feedback, this topic is now closed.

In the event you still have problems, please send me or any Moderator a Private Message and ask them to reopen this topic within the next 5 days.

Please include a link to your topic in the Private Message. Thank you.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users