Jump to content

spottswoode

Members
  • Posts

    10
  • Joined

  • Last visited

Everything posted by spottswoode

  1. Thank you so much for the incredible help.

  2. Thank you for the help, much appreciated!
  3. Results of screen317's Security Check version 0.99.56 Windows 7 Service Pack 1 x64 (UAC is enabled) Internet Explorer 9 ``````````````Antivirus/Firewall Check:`````````````` Windows Firewall Enabled! Norton Internet Security WMI entry may not exist for antivirus; attempting automatic update. `````````Anti-malware/Other Utilities Check:````````` Spybot - Search & Destroy Malwarebytes Anti-Malware version 1.70.0.1100 JavaFX 2.1.1 Java 6 Update 31 Java 7 Update 9 Adobe Flash Player 11.5.502.135 Adobe Reader XI Mozilla Firefox 9.0 Firefox out of Date! ````````Process Check: objlist.exe by Laurent```````` Norton ccSvcHst.exe Spybot Teatimer.exe is disabled! Malwarebytes' Anti-Malware mbamscheduler.exe `````````````````System Health check````````````````` Total Fragmentation on Drive C: 8% ````````````````````End of Log``````````````````````
  4. # AdwCleaner v2.104 - Logfile created 01/06/2013 at 21:07:57 # Updated 29/12/2012 by Xplode # Operating system : Windows 7 Ultimate Service Pack 1 (64 bits) # User : stephen mcallister - CLUMSEYGENIUS # Boot Mode : Normal # Running from : C:\Users\<me>\Desktop\adwcleaner.exe # Option [search] ***** [services] ***** ***** [Files / Folders] ***** ***** [Registry] ***** Key Found : HKCU\Software\AppDataLow\Software\AskToolbar Key Found : HKCU\Software\Ask.com Key Found : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Key Found : HKLM\SOFTWARE\Wow6432Node\Classes\CLSID\{826D7151-8D99-434B-8540-082B8C2AE556} Key Found : HKLM\SOFTWARE\Wow6432Node\Classes\Interface\{66EEF543-A9AC-4A9D-AA3C-1ED148AC8EEE} Key Found : HKLM\SOFTWARE\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5} Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\A28B4D68DEBAA244EB686953B7074FEF ***** [internet Browsers] ***** -\\ Internet Explorer v9.0.8112.16457 [OK] Registry is clean. -\\ Mozilla Firefox v9.0 (en-GB) File : C:\Users\stephen mcallister\AppData\Roaming\Mozilla\Firefox\Profiles\hi9ucsq2.default\prefs.js Found : user_pref("gm-notifier.ui.counter.showInbox", true); File : C:\Users\<me>\AppData\Roaming\Mozilla\Firefox\Profiles\njjfnk22.default\prefs.js [OK] File is clean. ************************* AdwCleaner[R1].txt - [1466 octets] - [06/01/2013 21:07:57] ########## EOF - C:\AdwCleaner[R1].txt - [1526 octets] ########## I don't see any entries that I am concerned about losing.
  5. Sorry, didn't see the note about where to find the logs. Attached. mbar-log-2013-01-06 (20-33-21).txt system-log.txt
  6. MBAR didn't find any threats. After I closed mbar, windows update wasn't working, but I ran fix damage and rebooted and it's working as usual.
  7. please note: that W drive is an old drive i used when installed my ssd a couple of years ago.
  8. mbam log when infection was found Malwarebytes Anti-Malware 1.70.0.1100 www.malwarebytes.org Database version: v2012.12.31.01 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 stephen mcallister :: CLUMSEYGENIUS [administrator] 06/01/2013 6:30:55 PM mbam-log-2013-01-06 (18-30-55).txt Scan type: Quick scan Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 241608 Time elapsed: 1 minute(s), 26 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 0 (No malicious items detected) Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 1 C:\Users\stephen mcallister\AppData\Local\Temp\13361.exe (Backdoor.Bot) -> Quarantined and deleted successfully. (end) mbam recent log Malwarebytes Anti-Malware 1.70.0.1100 www.malwarebytes.org Database version: v2013.01.06.08 Windows 7 Service Pack 1 x64 NTFS Internet Explorer 9.0.8112.16421 stephen mcallister :: CLUMSEYGENIUS [administrator] 06/01/2013 7:04:31 PM mbam-log-2013-01-06 (19-04-31).txt Scan type: Quick scan Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM Scan options disabled: P2P Objects scanned: 239857 Time elapsed: 1 minute(s), 13 second(s) Memory Processes Detected: 0 (No malicious items detected) Memory Modules Detected: 0 (No malicious items detected) Registry Keys Detected: 0 (No malicious items detected) Registry Values Detected: 0 (No malicious items detected) Registry Data Items Detected: 0 (No malicious items detected) Folders Detected: 0 (No malicious items detected) Files Detected: 0 (No malicious items detected) (end) RK log RogueKiller V8.4.2 [Jan 6 2013] by Tigzy mail : tigzyRK<at>gmail<dot>com Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/ Website : http://tigzy.geekstogo.com/roguekiller.php Blog : http://tigzyrk.blogspot.com/ Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version Started in : Normal mode User : stephen mcallister [Admin rights] Mode : Scan -- Date : 01/06/2013 19:38:51 ¤¤¤ Bad processes : 0 ¤¤¤ ¤¤¤ Registry Entries : 9 ¤¤¤ [RUN][sUSP PATH] HKCU\[...]\Run : icq (C:\Users\stephen mcallister\AppData\Roaming\ICQM\icq.exe -CU) -> FOUND [RUN][bLACKLISTDLL] HKLM\[...]\Run : Cm108Sound (C:\Windows\syswow64\RunDll32.exe C:\Windows\Syswow64\cm108.dll,CMICtrlWnd) -> FOUND [RUN][sUSP PATH] HKUS\S-1-5-21-3231266768-4001767025-273698762-1000[...]\Run : icq (C:\Users\stephen mcallister\AppData\Roaming\ICQM\icq.exe -CU) -> FOUND [TASK][sUSP PATH] Alarm : "C:\Users\stephen mcallister\Desktop\equinox_sci_wax_radio_090111.mp3" -> FOUND [HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND [HJPOL] HKLM\[...]\Wow6432Node\System : DisableRegistryTools (0) -> FOUND [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND [RUN][bLACKLISTDLL] [ON_W:]HKLM\Software[...]\Run : Cm108Sound (C:\Windows\syswow64\RunDll32.exe C:\Windows\Syswow64\cm108.dll,CMICtrlWnd) -> FOUND ¤¤¤ Particular Files / Folders: ¤¤¤ ¤¤¤ Driver : [NOT LOADED] ¤¤¤ ¤¤¤ Extern Hives: ¤¤¤ -> W:\windows\system32\config\SOFTWARE -> W:\windows\system32\config\SYSTEM -> W:\Users\Default\NTUSER.DAT -> W:\Users\Default User\NTUSER.DAT -> W:\Users\Stephen McAllister\NTUSER.DAT -> W:\Documents and Settings\Default\NTUSER.DAT -> W:\Documents and Settings\Default User\NTUSER.DAT ¤¤¤ HOSTS File: ¤¤¤ --> C:\Windows\system32\drivers\etc\hosts 127.0.0.1 localhost ¤¤¤ MBR Check: ¤¤¤ +++++ PhysicalDrive0: WDC WD7501AALS-00J7B0 ATA Device +++++ --- User --- [MBR] 5b7a63329081828f2eecb71d675598be [bSP] 8e5db028d4964658b6060ac891226926 : Windows 7/8 MBR Code Partition table: 0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 51 | Size: 80001 Mo 1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 163842192 | Size: 635400 Mo User = LL1 ... OK! User = LL2 ... OK! +++++ PhysicalDrive1: OCZ-VERTEX2 ATA Device +++++ --- User --- [MBR] ab12359157b23e073c47280e4f1f7600 [bSP] 97fb3721f69c034ee0a311e495e04f4a : Windows 7/8 MBR Code Partition table: 0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 114471 Mo User = LL1 ... OK! User = LL2 ... OK! +++++ PhysicalDrive2: ST3250824AS ATA Device +++++ --- User --- [MBR] 44c8429ba71cb75c9475907c331001b0 [bSP] 5b3f940617f8364e6198b0d8688a539d : Windows XP MBR Code Partition table: 0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 238472 Mo User = LL1 ... OK! User = LL2 ... OK! +++++ PhysicalDrive3: WDC WD1002FAEX-00Z3A0 ATA Device +++++ --- User --- [MBR] e11a71ec95f6ae136ad4d3fe1cddc934 [bSP] e762d14e820de1666f1328aafa4b26ba : Windows 7/8 MBR Code Partition table: 0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 953867 Mo User = LL1 ... OK! User = LL2 ... OK! Finished : << RKreport[1]_S_01062013_02d1938.txt >> RKreport[1]_S_01062013_02d1938.txt
  9. Malware bytes recently detected backdoor.bot. I was logging into my online banking at the time. I haven't done anything except let Malwarebytes do it's thing and when I scan again there is no sign. In the meantime, I used another machine at home to change my TD banking password and also my google email products. Attached dds.txt and Attach.txt Attach.txt DDS.txt
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.