Jump to content

possible trojan


Recommended Posts

I found this forum (http://forums.malwarebytes.org/index.php?showtopic=113340) after looking around for information on the results of Malwarebytes scan I performed (and I entered the string from the malicious file), and I followed all of the instructions and removed the infected files, but I'm still concerned about my computer. I think I may have a trojan, but I'm not entirely sure. Norton isn't picking anything up, and actually, the rogue killer .exe that's on this page was identified as malware, which prevented the download. I used Malwarebytes rootkit program instead, which also located malicious files.

If you can recommend a better antivirus product (I even had a Norton tech manually scan my computer with no results), then I would greatly appreciate it. Incidentally, my Norton identity protection keeps crashing in chrome and the browser's speed has been impacted significantly.

Thanks a lot,

Jim

dds.txt

attach.txt

Link to post
Share on other sites

  • Staff

Greetings and Welcome to The Forums!!

My name is Gringo and I'll be glad to help you with your malware problems.

I have put together somethings for you to keep in mind while I am helping you to make things go easier and faster for both of us


  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.

    [*]Please do not attach logs or use code boxes, just copy and paste the text.

    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.

    [*]Please read every post completely before doing anything.

    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

    [*]Please provide feedback about your experience as we go.

    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.

NOTE: At the top of your post, click on the Watch Topic Button, select Immediate Notification, and click on Proceed. This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

 

 

 

These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-

  • Download Security Check by screen317 from
here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

-AdwCleaner-

  • Please download
AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+

Gringo

Link to post
Share on other sites

Hi Gringo,

I ran all of the scans, and I'm enclosing the results. FYI, the 'check FAKED' button was checked off when I ran the RogueKiller scan, but it started that way automatically. It seems as though I had a ZeroAccess rootkit. By the way, can you recommend any good resources for learning about malware / malvertising (e.g. books, articles, websites)? Thanks again for all of your help.

Jim

Results of screen317's Security Check version 0.99.57

Windows Vista Service Pack 2 x86 (UAC is enabled)

Internet Explorer 9

``````````````Antivirus/Firewall Check:``````````````

Windows Firewall Disabled!

Norton 360

WMI entry may not exist for antivirus; attempting automatic update.

`````````Anti-malware/Other Utilities Check:`````````

Spybot - Search & Destroy

Malwarebytes Anti-Malware version 1.70.0.1100

CCleaner

JavaFX 2.1.1

Java 6 Update 32

Java 7 Update 9

Java 6 Update 2

Java 6 Update 7

Java SE Development Kit 6 Update 30

Java DB 10.6.2.1

Java version out of Date!

Adobe Flash Player 11.5.502.146

Adobe Reader 9 Adobe Reader out of Date!

Mozilla Firefox 14.0.1 Firefox out of Date!

Google Chrome 24.0.1312.56

````````Process Check: objlist.exe by Laurent````````

Norton ccSvcHst.exe

Malwarebytes Anti-Malware mbamservice.exe

Malwarebytes Anti-Malware mbamgui.exe

Spybot Teatimer.exe is disabled!

Malwarebytes' Anti-Malware mbamscheduler.exe

`````````````````System Health check`````````````````

Total Fragmentation on Drive C: 1 %

````````````````````End of Log``````````````````````

------------------------------------------------------------------------------------------------------------------

# AdwCleaner v2.109 - Logfile created 01/29/2013 at 18:16:22

# Updated 26/01/2013 by Xplode

# Operating system : Windows Vista Home Premium Service Pack 2 (32 bits)

# User : Jim - JJ

# Boot Mode : Normal

# Running from : C:\Users\Jim\Desktop\adwcleaner.exe

# Option [search]

***** [services] *****

***** [Files / Folders] *****

File Found : C:\Users\Jim\AppData\Roaming\Mozilla\Firefox\Profiles\npwykqgg.default\searchplugins\safesearch.xml

Folder Found : C:\Program Files\Mozilla Firefox\Extensions\afurladvisor@anchorfree.com

Folder Found : C:\Program Files\Viewpoint

Folder Found : C:\ProgramData\~0

Folder Found : C:\ProgramData\Viewpoint

***** [Registry] *****

Key Found : HKCU\Software\Conduit

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\ViewpointMediaPlayer

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Found : HKCU\Software\Softonic

Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl

Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1

Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary

Key Found : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1

Key Found : HKLM\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{761F6A83-F007-49E4-8EAC-CDB6808EF06F}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{76C45B18-A29E-43EA-AAF8-AF55C2E1AE17}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{96EF404C-24C7-43D0-9096-4CCC8BB7CCAC}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{97720195-206A-42AE-8E65-260B9BA5589F}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{97D69524-BB57-4185-9C7F-5F05593B771A}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{986F7A5A-9676-47E1-8642-F41F8C3FCF82}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{B18788A4-92BD-440E-A4D1-380C36531119}

Key Found : HKLM\SOFTWARE\Classes\CLSID\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Found : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48}

Key Found : HKLM\SOFTWARE\Classes\S

Key Found : HKLM\Software\Conduit

Key Found : HKLM\Software\Freeze.com

Key Found : HKLM\Software\MetaStream

Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}

Key Found : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}

Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966

Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094

Key Found : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536

Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ViewpointMediaPlayer

Key Found : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP

Key Found : HKLM\SOFTWARE\Software

Key Found : HKLM\Software\Viewpoint

Value Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Run []

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16457

[OK] Registry is clean.

-\\ Mozilla Firefox v14.0.1 (en-US)

File : C:\Users\Jim\AppData\Roaming\Mozilla\Firefox\Profiles\npwykqgg.default\prefs.js

Found : user_pref("keyword.URL", "hxxp://search.hotspotshield.com/g/results.php?c=s&q=");

-\\ Google Chrome v24.0.1312.56

File : C:\Users\Jim\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [4502 octets] - [29/01/2013 18:16:22]

########## EOF - C:\AdwCleaner[R1].txt - [4562 octets] ##########

----------------------------------------------------------------------------------------------------------------

# AdwCleaner v2.109 - Logfile created 01/29/2013 at 18:21:36

# Updated 26/01/2013 by Xplode

# Operating system : Windows Vista Home Premium Service Pack 2 (32 bits)

# User : Jim - JJ

# Boot Mode : Normal

# Running from : C:\Users\Jim\Desktop\adwcleaner.exe

# Option [Delete]

***** [services] *****

***** [Files / Folders] *****

File Deleted : C:\Users\Jim\AppData\Roaming\Mozilla\Firefox\Profiles\npwykqgg.default\searchplugins\safesearch.xml

Folder Deleted : C:\Program Files\Mozilla Firefox\Extensions\afurladvisor@anchorfree.com

Folder Deleted : C:\Program Files\Viewpoint

Folder Deleted : C:\ProgramData\~0

Folder Deleted : C:\ProgramData\Viewpoint

***** [Registry] *****

Key Deleted : HKCU\Software\Conduit

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\ViewpointMediaPlayer

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Deleted : HKCU\Software\Softonic

Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl

Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1

Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary

Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{761F6A83-F007-49E4-8EAC-CDB6808EF06F}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{76C45B18-A29E-43EA-AAF8-AF55C2E1AE17}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{96EF404C-24C7-43D0-9096-4CCC8BB7CCAC}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{97720195-206A-42AE-8E65-260B9BA5589F}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{97D69524-BB57-4185-9C7F-5F05593B771A}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{986F7A5A-9676-47E1-8642-F41F8C3FCF82}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B18788A4-92BD-440E-A4D1-380C36531119}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{813A22E0-3E2B-4188-9BDA-ECA9878B8D48}

Key Deleted : HKLM\SOFTWARE\Classes\S

Key Deleted : HKLM\Software\Conduit

Key Deleted : HKLM\Software\Freeze.com

Key Deleted : HKLM\Software\MetaStream

Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}

Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}

Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}

Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966

Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094

Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536

Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ViewpointMediaPlayer

Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP

Key Deleted : HKLM\SOFTWARE\Software

Key Deleted : HKLM\Software\Viewpoint

Value Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Run []

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16457

[OK] Registry is clean.

-\\ Mozilla Firefox v14.0.1 (en-US)

File : C:\Users\Jim\AppData\Roaming\Mozilla\Firefox\Profiles\npwykqgg.default\prefs.js

Deleted : user_pref("keyword.URL", "hxxp://search.hotspotshield.com/g/results.php?c=s&q=");

-\\ Google Chrome v24.0.1312.56

File : C:\Users\Jim\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [4631 octets] - [29/01/2013 18:16:22]

AdwCleaner[s1].txt - [325 octets] - [29/01/2013 18:18:32]

AdwCleaner[s2].txt - [4713 octets] - [29/01/2013 18:21:36]

########## EOF - C:\AdwCleaner[s2].txt - [4773 octets] ##########

-------------------------------------------------------------------------------------------------------------------

RogueKiller V8.4.3 [Jan 31 2013] by Tigzy

mail : tigzyRK<at>gmail<dot>com

Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/

Website : http://tigzy.geekstogo.com/roguekiller.php

Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version

Started in : Normal mode

User : Jim [Admin rights]

Mode : Remove -- Date : 01/31/2013 20:52:18

| ARK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

[ZeroAccess][FILE] @ : C:\Users\Jim\AppData\Local\{ff24043d-55f8-5ce9-a20a-8337d9b4b888}\@ --> REMOVED

¤¤¤ Driver : [LOADED] ¤¤¤

SSDT[13] : NtAlertResumeThread @ 0x8269365D -> HOOKED (Unknown @ 0x8846A9A0)

SSDT[14] : NtAlertThread @ 0x8260C295 -> HOOKED (Unknown @ 0x8846AA80)

SSDT[18] : NtAllocateVirtualMemory @ 0x8264854B -> HOOKED (Unknown @ 0x8847A430)

SSDT[21] : NtAlpcConnectPort @ 0x825EA88B -> HOOKED (Unknown @ 0x852FCAC0)

SSDT[42] : NtAssignProcessToJobObject @ 0x825BDB47 -> HOOKED (Unknown @ 0x8846A0D0)

SSDT[67] : NtCreateMutant @ 0x82620862 -> HOOKED (Unknown @ 0x8846A6F0)

SSDT[77] : NtCreateSymbolicLinkObject @ 0x825C035E -> HOOKED (Unknown @ 0x8846BDF0)

SSDT[78] : NtCreateThread @ 0x82691C74 -> HOOKED (Unknown @ 0x8847A918)

SSDT[116] : NtDebugActiveProcess @ 0x82664D78 -> HOOKED (Unknown @ 0x8846A1B0)

SSDT[129] : NtDuplicateObject @ 0x825F8581 -> HOOKED (Unknown @ 0x8847A600)

SSDT[147] : NtFreeVirtualMemory @ 0x82484F1D -> HOOKED (Unknown @ 0x8847A1E8)

SSDT[156] : NtImpersonateAnonymousToken @ 0x825BAF16 -> HOOKED (Unknown @ 0x8846A7E0)

SSDT[158] : NtImpersonateThread @ 0x825D0553 -> HOOKED (Unknown @ 0x8846A8C0)

SSDT[165] : NtLoadDriver @ 0x8256BDEE -> HOOKED (Unknown @ 0x8846A370)

SSDT[177] : NtMapViewOfSection @ 0x826108DA -> HOOKED (Unknown @ 0x8847A0E8)

SSDT[184] : NtOpenEvent @ 0x825F9DFF -> HOOKED (Unknown @ 0x8846A610)

SSDT[194] : NtOpenProcess @ 0x82620FFE -> HOOKED (Unknown @ 0x8847A7E0)

SSDT[195] : NtOpenProcessToken @ 0x82601A60 -> HOOKED (Unknown @ 0x8847A520)

SSDT[197] : NtOpenSection @ 0x826116AD -> HOOKED (Unknown @ 0x8846A450)

SSDT[201] : NtOpenThread @ 0x8261C54F -> HOOKED (Unknown @ 0x8847A6F0)

SSDT[210] : NtProtectVirtualMemory @ 0x8261A332 -> HOOKED (Unknown @ 0x8846BFC0)

SSDT[282] : NtResumeThread @ 0x8261BB9A -> HOOKED (Unknown @ 0x8846AB60)

SSDT[289] : NtSetContextThread @ 0x8269310B -> HOOKED (Unknown @ 0x8846AE00)

SSDT[305] : NtSetInformationProcess @ 0x82614908 -> HOOKED (Unknown @ 0x8846AEE0)

SSDT[317] : NtSetSystemInformation @ 0x825E6EEF -> HOOKED (Unknown @ 0x8846A290)

SSDT[330] : NtSuspendProcess @ 0x82693597 -> HOOKED (Unknown @ 0x8846A530)

SSDT[331] : NtSuspendThread @ 0x8259A92D -> HOOKED (Unknown @ 0x8846AC40)

SSDT[334] : NtTerminateProcess @ 0x825F1173 -> HOOKED (Unknown @ 0x88466AD8)

SSDT[335] : unknown @ 0x8261C584 -> HOOKED (Unknown @ 0x8846AD20)

SSDT[348] : NtUnmapViewOfSection @ 0x82610B9D -> HOOKED (Unknown @ 0x8846AFD0)

SSDT[358] : NtWriteVirtualMemory @ 0x8260D96D -> HOOKED (Unknown @ 0x8847A2D8)

SSDT[382] : NtCreateThreadEx @ 0x8261C039 -> HOOKED (Unknown @ 0x8846BEE0)

S_SSDT[317] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x88A7D490)

S_SSDT[397] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x88481AD8)

S_SSDT[428] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x88A7F448)

S_SSDT[430] : NtUserGetKeyState -> HOOKED (Unknown @ 0x88481B98)

S_SSDT[442] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x874FF880)

S_SSDT[479] : NtUserMessageCall -> HOOKED (Unknown @ 0x88A80CB8)

S_SSDT[497] : NtUserPostMessage -> HOOKED (Unknown @ 0x88A7F378)

S_SSDT[498] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x88A7F2A8)

S_SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x88A820C8)

S_SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x87500D10)

¤¤¤ Infection : ZeroAccess ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost

::1 localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: FUJITSU MHZ2250BH G2 +++++

--- User ---

[MBR] f3e79be839f498db4cfd6a1a515cc5bd

[bSP] 892a711584017c3455ee860c33419776 : HP tatooed MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 226486 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 463844745 | Size: 11985 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[2]_D_01312013_02d2052.txt >>

RKreport[1]_S_01312013_02d2050.txt ; RKreport[2]_D_01312013_02d2052.txt

-------------------------------------------------------------------------------------------------------------------

RogueKiller V8.4.3 [Jan 31 2013] by Tigzy

mail : tigzyRK<at>gmail<dot>com

Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/

Website : http://tigzy.geekstogo.com/roguekiller.php

Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version

Started in : Normal mode

User : Jim [Admin rights]

Mode : Scan -- Date : 01/31/2013 20:50:42

| ARK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

[ZeroAccess][FILE] @ : C:\Users\Jim\AppData\Local\{ff24043d-55f8-5ce9-a20a-8337d9b4b888}\@ --> FOUND

¤¤¤ Driver : [LOADED] ¤¤¤

SSDT[13] : NtAlertResumeThread @ 0x8269365D -> HOOKED (Unknown @ 0x8846A9A0)

SSDT[14] : NtAlertThread @ 0x8260C295 -> HOOKED (Unknown @ 0x8846AA80)

SSDT[18] : NtAllocateVirtualMemory @ 0x8264854B -> HOOKED (Unknown @ 0x8847A430)

SSDT[21] : NtAlpcConnectPort @ 0x825EA88B -> HOOKED (Unknown @ 0x852FCAC0)

SSDT[42] : NtAssignProcessToJobObject @ 0x825BDB47 -> HOOKED (Unknown @ 0x8846A0D0)

SSDT[67] : NtCreateMutant @ 0x82620862 -> HOOKED (Unknown @ 0x8846A6F0)

SSDT[77] : NtCreateSymbolicLinkObject @ 0x825C035E -> HOOKED (Unknown @ 0x8846BDF0)

SSDT[78] : NtCreateThread @ 0x82691C74 -> HOOKED (Unknown @ 0x8847A918)

SSDT[116] : NtDebugActiveProcess @ 0x82664D78 -> HOOKED (Unknown @ 0x8846A1B0)

SSDT[129] : NtDuplicateObject @ 0x825F8581 -> HOOKED (Unknown @ 0x8847A600)

SSDT[147] : NtFreeVirtualMemory @ 0x82484F1D -> HOOKED (Unknown @ 0x8847A1E8)

SSDT[156] : NtImpersonateAnonymousToken @ 0x825BAF16 -> HOOKED (Unknown @ 0x8846A7E0)

SSDT[158] : NtImpersonateThread @ 0x825D0553 -> HOOKED (Unknown @ 0x8846A8C0)

SSDT[165] : NtLoadDriver @ 0x8256BDEE -> HOOKED (Unknown @ 0x8846A370)

SSDT[177] : NtMapViewOfSection @ 0x826108DA -> HOOKED (Unknown @ 0x8847A0E8)

SSDT[184] : NtOpenEvent @ 0x825F9DFF -> HOOKED (Unknown @ 0x8846A610)

SSDT[194] : NtOpenProcess @ 0x82620FFE -> HOOKED (Unknown @ 0x8847A7E0)

SSDT[195] : NtOpenProcessToken @ 0x82601A60 -> HOOKED (Unknown @ 0x8847A520)

SSDT[197] : NtOpenSection @ 0x826116AD -> HOOKED (Unknown @ 0x8846A450)

SSDT[201] : NtOpenThread @ 0x8261C54F -> HOOKED (Unknown @ 0x8847A6F0)

SSDT[210] : NtProtectVirtualMemory @ 0x8261A332 -> HOOKED (Unknown @ 0x8846BFC0)

SSDT[282] : NtResumeThread @ 0x8261BB9A -> HOOKED (Unknown @ 0x8846AB60)

SSDT[289] : NtSetContextThread @ 0x8269310B -> HOOKED (Unknown @ 0x8846AE00)

SSDT[305] : NtSetInformationProcess @ 0x82614908 -> HOOKED (Unknown @ 0x8846AEE0)

SSDT[317] : NtSetSystemInformation @ 0x825E6EEF -> HOOKED (Unknown @ 0x8846A290)

SSDT[330] : NtSuspendProcess @ 0x82693597 -> HOOKED (Unknown @ 0x8846A530)

SSDT[331] : NtSuspendThread @ 0x8259A92D -> HOOKED (Unknown @ 0x8846AC40)

SSDT[334] : NtTerminateProcess @ 0x825F1173 -> HOOKED (Unknown @ 0x88466AD8)

SSDT[335] : unknown @ 0x8261C584 -> HOOKED (Unknown @ 0x8846AD20)

SSDT[348] : NtUnmapViewOfSection @ 0x82610B9D -> HOOKED (Unknown @ 0x8846AFD0)

SSDT[358] : NtWriteVirtualMemory @ 0x8260D96D -> HOOKED (Unknown @ 0x8847A2D8)

SSDT[382] : NtCreateThreadEx @ 0x8261C039 -> HOOKED (Unknown @ 0x8846BEE0)

S_SSDT[317] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x88A7D490)

S_SSDT[397] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x88481AD8)

S_SSDT[428] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x88A7F448)

S_SSDT[430] : NtUserGetKeyState -> HOOKED (Unknown @ 0x88481B98)

S_SSDT[442] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x874FF880)

S_SSDT[479] : NtUserMessageCall -> HOOKED (Unknown @ 0x88A80CB8)

S_SSDT[497] : NtUserPostMessage -> HOOKED (Unknown @ 0x88A7F378)

S_SSDT[498] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x88A7F2A8)

S_SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x88A820C8)

S_SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x87500D10)

¤¤¤ Infection : ZeroAccess ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost

::1 localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: FUJITSU MHZ2250BH G2 +++++

--- User ---

[MBR] f3e79be839f498db4cfd6a1a515cc5bd

[bSP] 892a711584017c3455ee860c33419776 : HP tatooed MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 226486 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 463844745 | Size: 11985 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[1]_S_01312013_02d2050.txt >>

RKreport[1]_S_01312013_02d2050.txt

-------------------------------------------------------------------------------------------------------------------

RogueKiller V8.4.3 [Jan 31 2013] by Tigzy

mail : tigzyRK<at>gmail<dot>com

Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/

Website : http://tigzy.geekstogo.com/roguekiller.php

Blog : http://tigzyrk.blogspot.com/

Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version

Started in : Normal mode

User : Jim [Admin rights]

Mode : Remove -- Date : 01/31/2013 20:52:18

| ARK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 2 ¤¤¤

[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> REPLACED (0)

[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

[ZeroAccess][FILE] @ : C:\Users\Jim\AppData\Local\{ff24043d-55f8-5ce9-a20a-8337d9b4b888}\@ --> REMOVED

¤¤¤ Driver : [LOADED] ¤¤¤

SSDT[13] : NtAlertResumeThread @ 0x8269365D -> HOOKED (Unknown @ 0x8846A9A0)

SSDT[14] : NtAlertThread @ 0x8260C295 -> HOOKED (Unknown @ 0x8846AA80)

SSDT[18] : NtAllocateVirtualMemory @ 0x8264854B -> HOOKED (Unknown @ 0x8847A430)

SSDT[21] : NtAlpcConnectPort @ 0x825EA88B -> HOOKED (Unknown @ 0x852FCAC0)

SSDT[42] : NtAssignProcessToJobObject @ 0x825BDB47 -> HOOKED (Unknown @ 0x8846A0D0)

SSDT[67] : NtCreateMutant @ 0x82620862 -> HOOKED (Unknown @ 0x8846A6F0)

SSDT[77] : NtCreateSymbolicLinkObject @ 0x825C035E -> HOOKED (Unknown @ 0x8846BDF0)

SSDT[78] : NtCreateThread @ 0x82691C74 -> HOOKED (Unknown @ 0x8847A918)

SSDT[116] : NtDebugActiveProcess @ 0x82664D78 -> HOOKED (Unknown @ 0x8846A1B0)

SSDT[129] : NtDuplicateObject @ 0x825F8581 -> HOOKED (Unknown @ 0x8847A600)

SSDT[147] : NtFreeVirtualMemory @ 0x82484F1D -> HOOKED (Unknown @ 0x8847A1E8)

SSDT[156] : NtImpersonateAnonymousToken @ 0x825BAF16 -> HOOKED (Unknown @ 0x8846A7E0)

SSDT[158] : NtImpersonateThread @ 0x825D0553 -> HOOKED (Unknown @ 0x8846A8C0)

SSDT[165] : NtLoadDriver @ 0x8256BDEE -> HOOKED (Unknown @ 0x8846A370)

SSDT[177] : NtMapViewOfSection @ 0x826108DA -> HOOKED (Unknown @ 0x8847A0E8)

SSDT[184] : NtOpenEvent @ 0x825F9DFF -> HOOKED (Unknown @ 0x8846A610)

SSDT[194] : NtOpenProcess @ 0x82620FFE -> HOOKED (Unknown @ 0x8847A7E0)

SSDT[195] : NtOpenProcessToken @ 0x82601A60 -> HOOKED (Unknown @ 0x8847A520)

SSDT[197] : NtOpenSection @ 0x826116AD -> HOOKED (Unknown @ 0x8846A450)

SSDT[201] : NtOpenThread @ 0x8261C54F -> HOOKED (Unknown @ 0x8847A6F0)

SSDT[210] : NtProtectVirtualMemory @ 0x8261A332 -> HOOKED (Unknown @ 0x8846BFC0)

SSDT[282] : NtResumeThread @ 0x8261BB9A -> HOOKED (Unknown @ 0x8846AB60)

SSDT[289] : NtSetContextThread @ 0x8269310B -> HOOKED (Unknown @ 0x8846AE00)

SSDT[305] : NtSetInformationProcess @ 0x82614908 -> HOOKED (Unknown @ 0x8846AEE0)

SSDT[317] : NtSetSystemInformation @ 0x825E6EEF -> HOOKED (Unknown @ 0x8846A290)

SSDT[330] : NtSuspendProcess @ 0x82693597 -> HOOKED (Unknown @ 0x8846A530)

SSDT[331] : NtSuspendThread @ 0x8259A92D -> HOOKED (Unknown @ 0x8846AC40)

SSDT[334] : NtTerminateProcess @ 0x825F1173 -> HOOKED (Unknown @ 0x88466AD8)

SSDT[335] : unknown @ 0x8261C584 -> HOOKED (Unknown @ 0x8846AD20)

SSDT[348] : NtUnmapViewOfSection @ 0x82610B9D -> HOOKED (Unknown @ 0x8846AFD0)

SSDT[358] : NtWriteVirtualMemory @ 0x8260D96D -> HOOKED (Unknown @ 0x8847A2D8)

SSDT[382] : NtCreateThreadEx @ 0x8261C039 -> HOOKED (Unknown @ 0x8846BEE0)

S_SSDT[317] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x88A7D490)

S_SSDT[397] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x88481AD8)

S_SSDT[428] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x88A7F448)

S_SSDT[430] : NtUserGetKeyState -> HOOKED (Unknown @ 0x88481B98)

S_SSDT[442] : NtUserGetRawInputData -> HOOKED (Unknown @ 0x874FF880)

S_SSDT[479] : NtUserMessageCall -> HOOKED (Unknown @ 0x88A80CB8)

S_SSDT[497] : NtUserPostMessage -> HOOKED (Unknown @ 0x88A7F378)

S_SSDT[498] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x88A7F2A8)

S_SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x88A820C8)

S_SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x87500D10)

¤¤¤ Infection : ZeroAccess ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost

::1 localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: FUJITSU MHZ2250BH G2 +++++

--- User ---

[MBR] f3e79be839f498db4cfd6a1a515cc5bd

[bSP] 892a711584017c3455ee860c33419776 : HP tatooed MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 226486 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 463844745 | Size: 11985 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[2]_D_01312013_02d2052.txt >>

RKreport[1]_S_01312013_02d2050.txt ; RKreport[2]_D_01312013_02d2052.txt

Link to post
Share on other sites

  • Staff

Hello

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

Link 1
Link 2
Link 3

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

Link to post
Share on other sites

Hi Gringo,

Quick question before I proceed: RogueKiller left an RK_Quarantine folder on my desktop with NewStartPanel_{ registry entries, text, DAT and VIR files. Should I remove this folder or keep its contents? Also, if I close Norton I'll be disabling the firewall. Should I use the Windows firewall instead?

Jim

Link to post
Share on other sites

  • Staff

Hello

were you referring to the RogueKiller files as backups? - Yes our programs will make these backups if it removes anything just in case it removed something important

Are these the registry entries that were causing problems? - this line is what was causing the problems

¤¤¤ Particular Files / Folders: ¤¤¤

[ZeroAccess][FILE] @ : C:\Users\Jim\AppData\Local\{ff24043d-55f8-5ce9-a20a-8337d9b4b888}\@ --> FOUND

Gringo

Link to post
Share on other sites

Hi Gringo,

Just ran Combofix and this is what it picked up. Chrome seems to be running a bit better, but I'll keep you posted if anything changes (Norton identity protection kept failing before). Just out of curiosity, a) what sort of information can something like this pick up, and b) what precautions should I take? I'm beginning to study malware for my job now and I was wondering if you could recommend any good resources for this. Thanks again for all of your help.

Jim

ComboFix 13-02-03.03 - Jim 02/04/2013 0:04.1.2 - x86

Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3062.1712 [GMT -5:00]

Running from: c:\users\Jim\Desktop\ComboFix.exe

AV: Norton 360 *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}

FW: Norton 360 *Enabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}

SP: Norton 360 *Disabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}

SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\programdata\ntuser.dat

c:\users\Jim\GoToAssistDownloadHelper.exe

c:\windows\a3kebook.ini

c:\windows\akebook.ini

c:\windows\ANS2000.INI

c:\windows\system32\drivers\~GLH0014.TMP

c:\windows\system32\KBL.LOG

.

.

((((((((((((((((((((((((( Files Created from 2013-01-04 to 2013-02-04 )))))))))))))))))))))))))))))))

.

.

2013-02-04 05:23 . 2013-02-04 05:24 -------- d-----w- c:\users\Jim\AppData\Local\temp

2013-02-04 05:23 . 2013-02-04 05:23 -------- d-----w- c:\users\Default\AppData\Local\temp

2013-01-23 20:49 . 2013-01-23 20:49 -------- d-----w- c:\programdata\{6AD8E59C-250C-4201-B5BA-56ADEF76FF46}

2013-01-23 07:09 . 2013-01-23 07:09 -------- d-----w- C:\FRST

2013-01-23 03:08 . 2013-01-23 03:08 -------- d-----w- c:\program files\FileASSASSIN

2013-01-22 16:46 . 2013-01-22 16:48 -------- d-----w- c:\programdata\188F1432-103A-4ffb-80F1-36B633C5C9E1

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin7.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin6.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin5.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin4.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin3.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin2.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin.dll

2013-01-22 06:28 . 2013-01-22 06:35 -------- d-----w- c:\users\Jim\AppData\Roaming\calibre

2013-01-22 06:26 . 2013-01-22 06:27 -------- d-----w- c:\program files\Calibre2

2013-01-20 04:54 . 2013-01-20 04:54 -------- d-----w- c:\users\Jim\AppData\Roaming\Malwarebytes

2013-01-20 04:53 . 2013-01-20 04:53 -------- d-----w- c:\programdata\Malwarebytes

2013-01-20 04:53 . 2013-01-24 21:24 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2013-01-20 04:53 . 2012-12-14 21:49 21104 ----a-w- c:\windows\system32\drivers\mbam.sys

2013-01-16 07:12 . 2013-01-16 07:29 -------- d-----w- c:\users\Jim\AppData\Roaming\WindSolutions

2013-01-16 07:12 . 2013-01-16 07:14 -------- d-----w- c:\programdata\WindSolutions

2013-01-16 06:48 . 2013-01-16 06:48 -------- d-----w- c:\users\Jim\AppData\Roaming\Blackberry Desktop

2013-01-12 16:22 . 2013-01-12 16:22 142496 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS

2013-01-12 16:22 . 2013-01-12 16:22 -------- d-----w- c:\program files\Symantec

2013-01-12 16:18 . 2013-01-29 23:27 -------- d-----w- c:\windows\system32\drivers\N360

2013-01-12 16:18 . 2013-01-12 16:18 -------- d-----w- c:\program files\Norton 360

2013-01-12 06:42 . 2013-01-12 06:42 60872 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{C03035BB-354F-4AF3-9410-76722053E799}\offreg.dll

2013-01-12 06:35 . 2012-11-19 06:04 6812136 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{C03035BB-354F-4AF3-9410-76722053E799}\mpengine.dll

2013-01-10 19:41 . 2013-01-10 19:41 37064 ----a-w- c:\windows\system32\drivers\taphss6.sys

2013-01-10 19:27 . 2013-01-10 19:27 36040 ----a-w- c:\windows\system32\drivers\hssdrv6.sys

2013-01-10 19:04 . 2013-01-10 19:04 -------- d-----w- c:\programdata\PCSettings

2013-01-09 15:21 . 2012-11-23 01:35 2048000 ----a-w- c:\windows\system32\win32k.sys

2013-01-09 15:20 . 2012-11-20 04:22 204288 ----a-w- c:\windows\system32\ncrypt.dll

2013-01-09 15:20 . 2012-11-02 10:19 1400832 ----a-w- c:\windows\system32\msxml6.dll

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2013-01-09 19:50 . 2012-11-30 00:05 74248 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2013-01-09 19:50 . 2012-11-30 00:05 697864 ----a-w- c:\windows\system32\FlashPlayerApp.exe

2012-12-16 13:12 . 2012-12-20 22:29 34304 ----a-w- c:\windows\system32\atmlib.dll

2012-12-16 10:50 . 2012-12-20 22:29 293376 ----a-w- c:\windows\system32\atmfd.dll

2012-11-14 02:09 . 2012-12-13 01:44 1800704 ----a-w- c:\windows\system32\jscript9.dll

2012-11-14 01:58 . 2012-12-13 01:44 1427968 ----a-w- c:\windows\system32\inetcpl.cpl

2012-11-14 01:57 . 2012-12-13 01:44 1129472 ----a-w- c:\windows\system32\wininet.dll

2012-11-14 01:49 . 2012-12-13 01:44 142848 ----a-w- c:\windows\system32\ieUnatt.exe

2012-11-14 01:48 . 2012-12-13 01:44 420864 ----a-w- c:\windows\system32\vbscript.dll

2012-11-14 01:44 . 2012-12-13 01:44 2382848 ----a-w- c:\windows\system32\mshtml.tlb

2012-11-13 01:29 . 2012-12-12 15:52 2048 ----a-w- c:\windows\system32\tzres.dll

2013-01-19 06:15 . 2013-01-19 06:15 262552 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

2009-03-05 22:08 . 2013-01-19 06:15 49664 ----a-w- c:\program files\mozilla firefox\components\FFComm.dll

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]

"cdloader"="c:\users\Jim\AppData\Roaming\mjusbsp\cdloader2.exe" [2012-02-01 50592]

"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-03-28 1045800]

"SMSERIAL"="c:\program files\Motorola\SMSERIAL\sm56hlpr.exe" [2007-01-17 634880]

"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2008-12-04 186904]

"QlbCtrl"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2007-09-19 202032]

"OnScreenDisplay"="c:\program files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe" [2007-09-04 554320]

"HP Health Check Scheduler"="c:\program files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe" [2008-06-16 75008]

"hpWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2007-09-13 480560]

"WAWifiMessage"="c:\program files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe" [2007-01-08 311296]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-02-26 173592]

"HP Software Update"="c:\program files\Hp\HP Software Update\HPWuSchd2.exe" [2009-11-18 54576]

"VBTUCopy"="c:\program files\VBTUCopy\VBTUCopy.exe" [2007-01-19 356352]

"VERIZONDM"="c:\program files\VERIZONDM\bin\sprtcmd.exe" [2012-06-02 206120]

"RtHDVCpl"="RtHDVCpl.exe" [2007-10-09 4702208]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]

"KeyScrambler"="c:\program files\KeyScrambler\keyscrambler.exe" [2012-09-15 431760]

"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2012-10-25 421888]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2012-12-12 152544]

.

c:\users\Jim\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutorunsDisabled

OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

.

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\AutorunsDisabled

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-11-18 275072]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"EnableUIADesktopToggle"= 0 (0x0)

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NortonLive EasySupport]

@="NortonLive EasySupport"

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]

@="Service"

.

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Exif Launcher S.lnk]

path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Exif Launcher S.lnk

backup=c:\windows\pss\Exif Launcher S.lnk.CommonStartup

backupExtension=.CommonStartup

.

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^VPN Client.lnk]

path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\VPN Client.lnk

backup=c:\windows\pss\VPN Client.lnk.CommonStartup

backupExtension=.CommonStartup

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NokiaMServer]

c:\program files\Common Files\Nokia\MPlatform\NokiaMServer [X]

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]

2012-12-03 07:35 946352 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]

2012-11-28 19:13 59280 ----a-w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BlackBerryAutoUpdate]

2009-08-24 20:27 623960 ----a-w- c:\program files\Common Files\Research In Motion\Auto Update\RIMAutoUpdate.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]

2012-12-12 18:57 152544 ----a-w- c:\program files\iTunes\iTunesHelper.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LightScribe Control Panel]

2009-01-27 22:30 2387968 ----a-w- c:\program files\Common Files\LightScribe\LightScribeControlPanel.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]

2012-11-09 16:27 17877168 ----a-r- c:\program files\Skype\Phone\Skype.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]

2009-01-26 19:31 2144088 --sha-r- c:\program files\Spybot - Search & Destroy\TeaTimer.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]

2008-01-21 02:23 1008184 ----a-w- c:\program files\Windows Defender\MSASCui.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SophosAntiVirus]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - TRUESIGHT

*Deregistered* - TrueSight

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

HPService REG_MULTI_SZ HPSLPSVC

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache

.

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]

2009-01-27 22:28 451872 ----a-w- c:\program files\Common Files\LightScribe\LSRunOnce.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]

2013-02-03 16:17 1607120 ----a-w- c:\program files\Google\Chrome\Application\24.0.1312.57\Installer\chrmstp.exe

.

Contents of the 'Scheduled Tasks' folder

.

2013-02-04 c:\windows\Tasks\Adobe Flash Player Updater.job

- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-11-30 19:50]

.

2013-02-03 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-11 04:55]

.

2013-02-03 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-11 17:40]

.

2013-02-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-11 17:40]

.

2013-02-03 c:\windows\Tasks\HPCeeScheduleForJim.job

- c:\program files\hewlett-packard\sdp\ceement\HPCEE.exe [2008-02-18 19:58]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

mStart Page = hxxp://www.enterget.com

uInternet Settings,ProxyOverride = *.local

TCP: DhcpNameServer = 192.168.1.1

TCP: Interfaces\{F11C830B-596C-4B0D-8F44-B32713854D86}: NameServer = 8.8.8.8

FF - ProfilePath - c:\users\Jim\AppData\Roaming\Mozilla\Firefox\Profiles\npwykqgg.default\

FF - prefs.js: browser.search.selectedEngine - YouTube Video Search

FF - prefs.js: browser.startup.homepage - www.google.com

FF - ExtSQL: 2013-01-12 11:23; {2D3F3651-74B9-4795-BDEC-6DA2F431CB62}; c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\coFFPlgn

FF - ExtSQL: 2013-01-12 11:23; {BBDA0591-3099-440a-AA10-41764D9DB4DB}; c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\IPSFFPlgn

FF - ExtSQL: !HIDDEN! 2009-06-25 22:00; {20a82645-c095-46ed-80e3-08825760534b}; c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension

.

- - - - ORPHANS REMOVED - - - -

.

SafeBoot-WudfPf

SafeBoot-WudfRd

SafeBoot-SAVService

MSConfigStartUp-Weather - c:\program files\AWS\WeatherBug\Weather.exe

AddRemove-SMS Free Sender_is1 - c:\program files\SMS Free Sender\unins000.exe

AddRemove-{09FF4DB8-7DE9-4D47-B7DB-915DB7D9A8CA} - c:\programdata\{6AD8E59C-250C-4201-B5BA-56ADEF76FF46}\bm_installer.exe

.

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2013-02-04 00:24

Windows 6.0.6002 Service Pack 2 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\N360]

"ImagePath"="\"c:\program files\Norton 360\Engine\20.2.1.22\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\20.2.1.22\diMaster.dll\" /prefetch:1"

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_USERS\S-1-5-21-1259364024-2902358137-1944391248-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*)ð]

@Class="Shell"

@Allowed: (Read) (RestrictedCode)

.

[HKEY_USERS\S-1-5-21-1259364024-2902358137-1944391248-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*)ð\OpenWithList]

@Class="Shell"

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:000000b5

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{1c11ae53-28a5-4ac7-ba9f-cd4109d7856c}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:0f001e68

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{316686b5-7750-46bd-9bd1-0cb0d53f450d}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:1a020054

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{34bb0e0c-69f6-4b94-8bdd-e734aabe46bf}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:0f000000

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{9c642153-bfe0-4511-a0b6-e778ddd5ea9e}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:07001422

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{ba32a50a-3d27-4fae-8591-5916311409be}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:0c001422

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{c88eff7e-20e6-4664-9823-c4edba49e65e}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:0f0016d3

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{cf30122f-fa16-4df1-995f-909a38b020ed}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:14002100

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{e75fec02-ced3-4680-bf99-5b51d52a78a4}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:0f000000

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{f50c0996-5b4a-4c6a-a322-6e991d4caa0e}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:06001422

"Dhcpv6State"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\Tcpip6\Parameters\Interfaces\{f70a361f-6437-4fcc-91a4-cd88d468d91b}]

@DACL=(02 0000)

"Dhcpv6Iaid"=dword:0e001422

"Dhcpv6State"=dword:00000000

.

Completion time: 2013-02-04 00:29:59

ComboFix-quarantined-files.txt 2013-02-04 05:29

.

Pre-Run: 31,641,182,208 bytes free

Post-Run: 33,451,290,624 bytes free

.

- - End Of File - - 6E1AB6CB2E59294C66F5DB90BE724C0F

Link to post
Share on other sites

  • Staff

Greetings

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

 ClearJavaCache:: 

Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe

CFScriptB-4.gif

This will let ComboFix run again.

Restart if you have to.

Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  1. report from Combofix
  2. let me know of any problems you may have had
  3. How is the computer doing now after running the script?

Gringo

Link to post
Share on other sites

Hi Gringo,

I haven't had much of a chance to observe the computer since I ran the scan, but it seems a bit better (with some minor hitches in performance from Firefox and Chrome). I should note that both times that I ran Combofix, I forgot to turn of the anti-spyware component of Norton, and the program reminded me, at which point I turned the feature off and resumed Combofix. Is this a problem? Here's the most recent log. Thank you for your help.

Jim

ComboFix 13-02-03.03 - Jim 02/05/2013 0:46.2.2 - x86

Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.3062.1169 [GMT -5:00]

Running from: c:\users\Jim\Desktop\ComboFix.exe

Command switches used :: c:\users\Jim\Desktop\CFScript.txt

AV: Norton 360 *Disabled/Updated* {63DF5164-9100-186D-2187-8DC619EFD8BF}

FW: Norton 360 *Enabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}

SP: Norton 360 *Disabled/Updated* {D8BEB080-B73A-17E3-1B37-B6B462689202}

SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

.

.

((((((((((((((((((((((((( Files Created from 2013-01-05 to 2013-02-05 )))))))))))))))))))))))))))))))

.

.

2013-02-05 06:03 . 2013-02-05 06:03 -------- d-----w- c:\users\Jim\AppData\Local\temp

2013-02-05 06:03 . 2013-02-05 06:03 -------- d-----w- c:\users\Default\AppData\Local\temp

2013-01-23 20:49 . 2013-01-23 20:49 -------- d-----w- c:\programdata\{6AD8E59C-250C-4201-B5BA-56ADEF76FF46}

2013-01-23 07:09 . 2013-01-23 07:09 -------- d-----w- C:\FRST

2013-01-23 03:08 . 2013-01-23 03:08 -------- d-----w- c:\program files\FileASSASSIN

2013-01-22 16:46 . 2013-01-22 16:48 -------- d-----w- c:\programdata\188F1432-103A-4ffb-80F1-36B633C5C9E1

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin7.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin6.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin5.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin4.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin3.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin2.dll

2013-01-22 07:02 . 2013-01-22 07:02 159744 ----a-w- c:\program files\Internet Explorer\Plugins\npqtplugin.dll

2013-01-22 06:28 . 2013-01-22 06:35 -------- d-----w- c:\users\Jim\AppData\Roaming\calibre

2013-01-22 06:26 . 2013-01-22 06:27 -------- d-----w- c:\program files\Calibre2

2013-01-20 04:54 . 2013-01-20 04:54 -------- d-----w- c:\users\Jim\AppData\Roaming\Malwarebytes

2013-01-20 04:53 . 2013-01-20 04:53 -------- d-----w- c:\programdata\Malwarebytes

2013-01-20 04:53 . 2013-01-24 21:24 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware

2013-01-20 04:53 . 2012-12-14 21:49 21104 ----a-w- c:\windows\system32\drivers\mbam.sys

2013-01-16 07:12 . 2013-01-16 07:29 -------- d-----w- c:\users\Jim\AppData\Roaming\WindSolutions

2013-01-16 07:12 . 2013-01-16 07:14 -------- d-----w- c:\programdata\WindSolutions

2013-01-16 06:48 . 2013-01-16 06:48 -------- d-----w- c:\users\Jim\AppData\Roaming\Blackberry Desktop

2013-01-12 16:22 . 2013-01-12 16:22 142496 ----a-w- c:\windows\system32\drivers\SYMEVENT.SYS

2013-01-12 16:22 . 2013-01-12 16:22 -------- d-----w- c:\program files\Symantec

2013-01-12 16:18 . 2013-01-29 23:27 -------- d-----w- c:\windows\system32\drivers\N360

2013-01-12 16:18 . 2013-01-12 16:18 -------- d-----w- c:\program files\Norton 360

2013-01-12 06:42 . 2013-01-12 06:42 60872 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{C03035BB-354F-4AF3-9410-76722053E799}\offreg.dll

2013-01-12 06:35 . 2012-11-19 06:04 6812136 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{C03035BB-354F-4AF3-9410-76722053E799}\mpengine.dll

2013-01-10 19:41 . 2013-01-10 19:41 37064 ----a-w- c:\windows\system32\drivers\taphss6.sys

2013-01-10 19:27 . 2013-01-10 19:27 36040 ----a-w- c:\windows\system32\drivers\hssdrv6.sys

2013-01-10 19:04 . 2013-01-10 19:04 -------- d-----w- c:\programdata\PCSettings

2013-01-09 15:21 . 2012-11-23 01:35 2048000 ----a-w- c:\windows\system32\win32k.sys

2013-01-09 15:20 . 2012-11-20 04:22 204288 ----a-w- c:\windows\system32\ncrypt.dll

2013-01-09 15:20 . 2012-11-02 10:19 1400832 ----a-w- c:\windows\system32\msxml6.dll

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2013-01-09 19:50 . 2012-11-30 00:05 74248 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl

2013-01-09 19:50 . 2012-11-30 00:05 697864 ----a-w- c:\windows\system32\FlashPlayerApp.exe

2012-12-16 13:12 . 2012-12-20 22:29 34304 ----a-w- c:\windows\system32\atmlib.dll

2012-12-16 10:50 . 2012-12-20 22:29 293376 ----a-w- c:\windows\system32\atmfd.dll

2012-11-14 02:09 . 2012-12-13 01:44 1800704 ----a-w- c:\windows\system32\jscript9.dll

2012-11-14 01:58 . 2012-12-13 01:44 1427968 ----a-w- c:\windows\system32\inetcpl.cpl

2012-11-14 01:57 . 2012-12-13 01:44 1129472 ----a-w- c:\windows\system32\wininet.dll

2012-11-14 01:49 . 2012-12-13 01:44 142848 ----a-w- c:\windows\system32\ieUnatt.exe

2012-11-14 01:48 . 2012-12-13 01:44 420864 ----a-w- c:\windows\system32\vbscript.dll

2012-11-14 01:44 . 2012-12-13 01:44 2382848 ----a-w- c:\windows\system32\mshtml.tlb

2012-11-13 01:29 . 2012-12-12 15:52 2048 ----a-w- c:\windows\system32\tzres.dll

2013-01-19 06:15 . 2013-01-19 06:15 262552 ----a-w- c:\program files\mozilla firefox\components\browsercomps.dll

2009-03-05 22:08 . 2013-01-19 06:15 49664 ----a-w- c:\program files\mozilla firefox\components\FFComm.dll

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Sidebar"="c:\program files\Windows Sidebar\sidebar.exe" [2009-04-11 1233920]

"cdloader"="c:\users\Jim\AppData\Roaming\mjusbsp\cdloader2.exe" [2012-02-01 50592]

"WMPNSCFG"="c:\program files\Windows Media Player\WMPNSCFG.exe" [2008-01-21 202240]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"SynTPEnh"="c:\program files\Synaptics\SynTP\SynTPEnh.exe" [2008-03-28 1045800]

"SMSERIAL"="c:\program files\Motorola\SMSERIAL\sm56hlpr.exe" [2007-01-17 634880]

"IAAnotif"="c:\program files\Intel\Intel Matrix Storage Manager\iaanotif.exe" [2008-12-04 186904]

"QlbCtrl"="c:\program files\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe" [2007-09-19 202032]

"OnScreenDisplay"="c:\program files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe" [2007-09-04 554320]

"HP Health Check Scheduler"="c:\program files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe" [2008-06-16 75008]

"hpWirelessAssistant"="c:\program files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe" [2007-09-13 480560]

"WAWifiMessage"="c:\program files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe" [2007-01-08 311296]

"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-02-26 173592]

"HP Software Update"="c:\program files\Hp\HP Software Update\HPWuSchd2.exe" [2009-11-18 54576]

"VBTUCopy"="c:\program files\VBTUCopy\VBTUCopy.exe" [2007-01-19 356352]

"VERIZONDM"="c:\program files\VERIZONDM\bin\sprtcmd.exe" [2012-06-02 206120]

"RtHDVCpl"="RtHDVCpl.exe" [2007-10-09 4702208]

"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]

"KeyScrambler"="c:\program files\KeyScrambler\keyscrambler.exe" [2012-09-15 431760]

"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]

"QuickTime Task"="c:\program files\QuickTime\QTTask.exe" [2012-10-25 421888]

"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2012-12-12 152544]

.

c:\users\Jim\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\AutorunsDisabled

OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2009-2-26 97680]

.

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\AutorunsDisabled

HP Digital Imaging Monitor.lnk - c:\program files\HP\Digital Imaging\bin\hpqtra08.exe [2009-11-18 275072]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"EnableUIADesktopToggle"= 0 (0x0)

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\NortonLive EasySupport]

@="NortonLive EasySupport"

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]

@="Service"

.

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^Exif Launcher S.lnk]

path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\Exif Launcher S.lnk

backup=c:\windows\pss\Exif Launcher S.lnk.CommonStartup

backupExtension=.CommonStartup

.

[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^VPN Client.lnk]

path=c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\VPN Client.lnk

backup=c:\windows\pss\VPN Client.lnk.CommonStartup

backupExtension=.CommonStartup

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\NokiaMServer]

c:\program files\Common Files\Nokia\MPlatform\NokiaMServer [X]

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]

2012-12-03 07:35 946352 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]

2012-11-28 19:13 59280 ----a-w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\BlackBerryAutoUpdate]

2009-08-24 20:27 623960 ----a-w- c:\program files\Common Files\Research In Motion\Auto Update\RIMAutoUpdate.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\iTunesHelper]

2012-12-12 18:57 152544 ----a-w- c:\program files\iTunes\iTunesHelper.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\LightScribe Control Panel]

2009-01-27 22:30 2387968 ----a-w- c:\program files\Common Files\LightScribe\LightScribeControlPanel.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]

2012-11-09 16:27 17877168 ----a-r- c:\program files\Skype\Phone\Skype.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SpybotSD TeaTimer]

2009-01-26 19:31 2144088 --sha-r- c:\program files\Spybot - Search & Destroy\TeaTimer.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Windows Defender]

2008-01-21 02:23 1008184 ----a-w- c:\program files\Windows Defender\MSASCui.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SophosAntiVirus]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecAntiVirus]

"DisableMonitoring"=dword:00000001

.

[HKEY_LOCAL_MACHINE\software\microsoft\security center\Monitoring\SymantecFirewall]

"DisableMonitoring"=dword:00000001

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - TRUESIGHT

*Deregistered* - TrueSight

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]

HPZ12 REG_MULTI_SZ Pml Driver HPZ12 Net Driver HPZ12

HPService REG_MULTI_SZ HPSLPSVC

hpdevmgmt REG_MULTI_SZ hpqcxs08 hpqddsvc

LocalServiceAndNoImpersonation REG_MULTI_SZ FontCache

.

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{10880D85-AAD9-4558-ABDC-2AB1552D831F}]

2009-01-27 22:28 451872 ----a-w- c:\program files\Common Files\LightScribe\LSRunOnce.exe

.

[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]

2013-02-03 16:17 1607120 ----a-w- c:\program files\Google\Chrome\Application\24.0.1312.57\Installer\chrmstp.exe

.

Contents of the 'Scheduled Tasks' folder

.

2013-02-05 c:\windows\Tasks\Adobe Flash Player Updater.job

- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-11-30 19:50]

.

2013-02-04 c:\windows\Tasks\Google Software Updater.job

- c:\program files\Google\Common\Google Updater\GoogleUpdaterService.exe [2009-02-11 04:55]

.

2013-02-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-11 17:40]

.

2013-02-05 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files\Google\Update\GoogleUpdate.exe [2009-02-11 17:40]

.

2013-02-03 c:\windows\Tasks\HPCeeScheduleForJim.job

- c:\program files\hewlett-packard\sdp\ceement\HPCEE.exe [2008-02-18 19:58]

.

.

------- Supplementary Scan -------

.

uStart Page = hxxp://www.google.com/

mStart Page = hxxp://www.enterget.com

uInternet Settings,ProxyOverride = *.local

TCP: DhcpNameServer = 192.168.1.1

TCP: Interfaces\{F11C830B-596C-4B0D-8F44-B32713854D86}: NameServer = 8.8.8.8

FF - ProfilePath - c:\users\Jim\AppData\Roaming\Mozilla\Firefox\Profiles\npwykqgg.default\

FF - prefs.js: browser.search.selectedEngine - YouTube Video Search

FF - prefs.js: browser.startup.homepage - www.google.com

FF - ExtSQL: 2013-01-12 11:23; {2D3F3651-74B9-4795-BDEC-6DA2F431CB62}; c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\coFFPlgn

FF - ExtSQL: 2013-01-12 11:23; {BBDA0591-3099-440a-AA10-41764D9DB4DB}; c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\N360_20.1.0.24\IPSFFPlgn

FF - ExtSQL: !HIDDEN! 2009-06-25 22:00; {20a82645-c095-46ed-80e3-08825760534b}; c:\windows\Microsoft.NET\Framework\v3.5\Windows Presentation Foundation\DotNetAssistantExtension

.

.

**************************************************************************

.

catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net

Rootkit scan 2013-02-05 01:03

Windows 6.0.6002 Service Pack 2 NTFS

.

scanning hidden processes ...

.

scanning hidden autostart entries ...

.

scanning hidden files ...

.

scan completed successfully

hidden files: 0

.

**************************************************************************

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Services\N360]

"ImagePath"="\"c:\program files\Norton 360\Engine\20.2.1.22\ccSvcHst.exe\" /s \"N360\" /m \"c:\program files\Norton 360\Engine\20.2.1.22\diMaster.dll\" /prefetch:1"

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_USERS\S-1-5-21-1259364024-2902358137-1944391248-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*)ð]

@Class="Shell"

@Allowed: (Read) (RestrictedCode)

.

[HKEY_USERS\S-1-5-21-1259364024-2902358137-1944391248-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*)ð\OpenWithList]

@Class="Shell"

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

"MSCurrentCountry"=dword:000000b5

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

[HKEY_LOCAL_MACHINE\system\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0003\AllUserSettings]

@Denied: (A) (Users)

@Denied: (A) (Everyone)

@Allowed: (B 1 2 3 4 5) (S-1-5-20)

"BlindDial"=dword:00000000

.

Completion time: 2013-02-05 01:07:14

ComboFix-quarantined-files.txt 2013-02-05 06:07

ComboFix2.txt 2013-02-04 05:30

.

Pre-Run: 30,840,778,752 bytes free

Post-Run: 30,850,772,992 bytes free

.

- - End Of File - - E9616C5807D4BE33D8997D3DC634855C

Link to post
Share on other sites

  • Staff

Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)

  • Programs to remove

    • Adobe Reader X (10.1.5)
      Java 7 Update 9
      Java DB 10.6.2.1
      Java 6 Update 2
      Java 6 Update 32
      Java 6 Update 7
      Java SE Development Kit 6 Update 30
      JavaFX 2.1.1

  • Please download and install
Revo Uninstaller FreeDouble click Revo Uninstaller to run it.
From the list of programs double click on The Program to remove
When prompted if you want to uninstall click Yes.
Be sure the Moderate option is selected then click Next.
The program will run, If prompted again click Yes
when the built-in uninstaller is finished click on Next.
Once the program has searched for leftovers click Next.
Check/tick the bolded items only on the list then click Delete
when prompted click on Yes and then on next.
put a check on any folders that are found and select delete
when prompted select yes then on next
Once done click Finish.

.

Update Adobe reader

  • Recently there have been vulnerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.
    You can download it from
http://www.adobe.com/products/acrobat/readstep2.html
After installing the latest Adobe Reader, uninstall all previous versions.
If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.
  • If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from
here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.
Note: When installing FoxitReader, be careful not to install anything to do with AskBar.

Clean Out Temp Files

  • This small application you may want to keep and use once a week to keep the computer clean.
    Download CCleaner from here http://www.ccleaner.com/
    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
    • Click Run Cleaner.
    • Close CCleaner.

: Malwarebytes' Anti-Malware :

I see You have MBAM installed on the computer - that is great!! it is a very good program! I would like you to run a quick scan for me now

  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.

Click OK to either and let MBAM proceed with the disinfection process.

If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Download HijackThis

  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic

"information and logs"

  • In your next post I need the following
  1. Log From MBAM
  2. report from Hijackthis
  3. let me know of any problems you may have had
  4. How is the computer doing now?

Gringo

Link to post
Share on other sites

Hi Gringo,

The computer seems to be significantly better, when should I re-install Java and Adobe? Thanks for your help.

Jim

Malwarebytes Anti-Malware 1.70.0.1100

www.malwarebytes.org

Database version: v2013.02.08.01

Windows Vista Service Pack 2 x86 NTFS

Internet Explorer 9.0.8112.16421

Jim :: JJ [administrator]

2/7/2013 10:22:24 PM

mbam-log-2013-02-07 (22-22-24).txt

Scan type: Quick scan

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 237002

Time elapsed: 9 minute(s), 48 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 0

(No malicious items detected)

(end)

-------------------------------------------------------------------------------------------------------------------------------------

Logfile of Trend Micro HijackThis v2.0.4

Scan saved at 9:15:00 PM, on 2/7/2013

Platform: Windows Vista SP2 (WinNT 6.00.1906)

MSIE: Internet Explorer v9.00 (9.00.8112.16457)

Boot mode: Normal

Running processes:

C:\Windows\system32\Dwm.exe

C:\Windows\system32\taskeng.exe

C:\Windows\Explorer.EXE

C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exe

C:\Program Files\Intel\Intel Matrix Storage Manager\IAAnotif.exe

C:\Windows\system32\igfxsrvc.exe

C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\QLBCTRL.exe

C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe

C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe

C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe

C:\Windows\System32\hkcmd.exe

C:\Program Files\HP\HP Software Update\hpwuschd2.exe

C:\Program Files\VERIZONDM\bin\sprtcmd.exe

C:\Windows\RtHDVCpl.exe

C:\Program Files\KeyScrambler\KeyScrambler.exe

C:\Program Files\iTunes\iTunesHelper.exe

C:\Program Files\Windows Media Player\wmpnscfg.exe

C:\Program Files\Norton 360\Engine\20.2.1.22\ccSvcHst.exe

C:\Program Files\Hewlett-Packard\Shared\HpqToaster.exe

C:\Program Files\Synaptics\SynTP\SynTPHelper.exe

C:\Windows\System32\notepad.exe

C:\Program Files\HP\Digital Imaging\bin\hpqgpc01.exe

C:\Program Files\HP\Digital Imaging\bin\hpqste08.exe

C:\Program Files\HP\Digital Imaging\bin\hpqbam08.exe

C:\Program Files\Common Files\Apple\Internet Services\ApplePhotoStreams.exe

C:\Program Files\Microsoft Office\Office12\POWERPNT.EXE

C:\Users\Jim\AppData\Roaming\mjusbsp\magicJack.exe

C:\Windows\System32\notepad.exe

C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe

C:\Program Files\Mozilla Firefox\firefox.exe

C:\Program Files\Microsoft Office\Office12\WINWORD.EXE

C:\Windows\notepad.exe

C:\Users\Jim\Desktop\HijackThis.exe

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896

R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.enterget.com

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

O2 - BHO: HP Print Enhancer - {0347C33E-8762-4905-BF09-768834316C61} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_printenhancer.dll

O2 - BHO: RealPlayer Download and Record Plugin for Internet Explorer - {3049C3E9-B461-4BC5-8870-4C09146192CA} - C:\Program Files\Real\RealPlayer\rpbrowserrecordplugin.dll

O2 - BHO: Spybot-S&D IE Protection - {53707962-6F74-2D53-2644-206D7942484F} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll

O2 - BHO: Norton Identity Protection - {602ADB0E-4AFF-4217-8AA1-95DAC4DFA408} - C:\Program Files\Norton 360\Engine\20.2.1.22\coIEPlg.dll

O2 - BHO: Norton Vulnerability Protection - {6D53EC84-6AAE-4787-AEEE-F4628F01010C} - C:\Program Files\Norton 360\Engine\20.2.1.22\IPS\IPSBHO.DLL

O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files\Microsoft Office\Office12\GrooveShellExtensions.dll

O2 - BHO: Windows Live Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: SkypeIEPluginBHO - {AE805869-2E5C-4ED4-8F7B-F1F7851A4497} - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll

O2 - BHO: Google Toolbar Notifier BHO - {AF69DE43-7D58-4638-B6FA-CE66B5AD205D} - C:\Program Files\Google\GoogleToolbarNotifier\5.2.4204.1700\swg.dll

O2 - BHO: HP Smart BHO Class - {FFFFFFFF-CF4E-4F2B-BDC2-0E72E116A856} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll

O3 - Toolbar: Norton Toolbar - {7FEBEFE3-6B19-4349-98D2-FFB09D4B49CA} - C:\Program Files\Norton 360\Engine\20.2.1.22\coIEPlg.dll

O4 - HKLM\..\Run: [synTPEnh] C:\Program Files\Synaptics\SynTP\SynTPEnh.exe

O4 - HKLM\..\Run: [sMSERIAL] C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe

O4 - HKLM\..\Run: [iAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe

O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start

O4 - HKLM\..\Run: [OnScreenDisplay] C:\Program Files\Hewlett-Packard\HP QuickTouch\HPKBDAPP.exe

O4 - HKLM\..\Run: [HP Health Check Scheduler] c:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe

O4 - HKLM\..\Run: [hpWirelessAssistant] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\HPWAMain.exe

O4 - HKLM\..\Run: [WAWifiMessage] C:\Program Files\Hewlett-Packard\HP Wireless Assistant\WiFiMsg.exe

O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe

O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe

O4 - HKLM\..\Run: [VBTUCopy] C:\Program Files\VBTUCopy\VBTUCopy.exe /a /f

O4 - HKLM\..\Run: [VERIZONDM] "C:\Program Files\VERIZONDM\bin\sprtcmd.exe" /P VERIZONDM

O4 - HKLM\..\Run: [RtHDVCpl] RtHDVCpl.exe

O4 - HKLM\..\Run: [KeyScrambler] C:\Program Files\KeyScrambler\keyscrambler.exe /a

O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"

O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime

O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"

O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun

O4 - HKCU\..\Run: [cdloader] "C:\Users\Jim\AppData\Roaming\mjusbsp\cdloader2.exe" MAGICJACK

O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe

O4 - HKCU\..\Run: [Vidyo Desktop] C:\Program Files\Vidyo\Vidyo Desktop\VidyoDesktop.exe

O4 - Startup: AutorunsDisabled

O4 - Global Startup: AutorunsDisabled

O9 - Extra button: (no name) - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)

O9 - Extra 'Tools' menuitem: Sun Java Console - {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - (no file)

O9 - Extra button: Send to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll

O9 - Extra 'Tools' menuitem: S&end to OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~1\MICROS~3\Office12\ONBttnIE.dll

O9 - Extra button: (no name) - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll

O9 - Extra 'Tools' menuitem: &KeyScrambler Options - {5C106A59-CC3C-4caa-81A4-6D909B5ACE23} - C:\Program Files\KeyScrambler\KeyScramblerIE.dll

O9 - Extra button: Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll

O9 - Extra 'Tools' menuitem: Skype Click to Call - {898EA8C8-E7FF-479B-8935-AEC46303B9E5} - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll

O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~3\Office12\REFIEBAR.DLL

O9 - Extra button: Show or hide HP Smart Web Printing - {DDE87865-83C5-48c4-8357-2F5B1AA84522} - C:\Program Files\HP\Digital Imaging\Smart Web Printing\hpswp_BHO.dll

O9 - Extra button: (no name) - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll

O9 - Extra 'Tools' menuitem: Spybot - Search && Destroy Configuration - {DFB852A3-47F8-48C4-A200-58CAB36FD2A2} - C:\Program Files\Spybot - Search & Destroy\SDHelper.dll

O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics

O17 - HKLM\System\CCS\Services\Tcpip\..\{F11C830B-596C-4B0D-8F44-B32713854D86}: NameServer = 8.8.8.8

O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files\Microsoft Office\Office12\GrooveSystemServices.dll

O18 - Protocol: skype-ie-addon-data - {91774881-D725-4E58-B298-07617B9B86A8} - C:\Program Files\Skype\Toolbars\Internet Explorer\skypeieplugin.dll

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL

O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll

O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: Com4Qlb - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\HP Quick Launch Buttons\Com4Qlb.exe

O23 - Service: Cron Service for Prey (CronService) - Unknown owner - C:\Prey\platform\windows\cronsvc.exe (file missing)

O23 - Service: Cisco Systems, Inc. VPN Service (CVPND) - Cisco Systems, Inc. - C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe

O23 - Service: FABS - Helping agent for MAGIX media database (Fabs) - MAGIX AG - C:\Program Files\Common Files\MAGIX Services\Database\bin\FABS.exe

O23 - Service: Firebird Server - MAGIX Instance (FirebirdServerMAGIXInstance) - MAGIX® - C:\Program Files\Common Files\MAGIX Services\Database\bin\fbserver.exe

O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe

O23 - Service: Google Update Service (gupdate1c98c6fe7cf6cdc) (gupdate1c98c6fe7cf6cdc) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe

O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe

O23 - Service: Google Software Updater (gusvc) - Google - C:\Program Files\Google\Common\Google Updater\GoogleUpdaterService.exe

O23 - Service: HP Health Check Service - Hewlett-Packard - c:\Program Files\Hewlett-Packard\HP Health Check\hphc_service.exe

O23 - Service: hpqwmiex - Hewlett-Packard Development Company, L.P. - C:\Program Files\Hewlett-Packard\Shared\hpqwmiex.exe

O23 - Service: Hotspot Shield Service (hshld) - AnchorFree Inc. - C:\Program Files\Hotspot Shield\bin\openvpnas.exe

O23 - Service: Hotspot Shield Routing Service (HssSrv) - AnchorFree Inc. - C:\Program Files\Hotspot Shield\HssWPR\hsssrv.exe

O23 - Service: Hotspot Shield Tray Service (HssTrayService) - Unknown owner - C:\Program Files\Hotspot Shield\bin\HssTrayService.EXE

O23 - Service: Hotspot Shield Monitoring Service (HssWd) - Unknown owner - C:\Program Files\Hotspot Shield\bin\hsswd.exe

O23 - Service: Intel® Matrix Storage Event Monitor (IAANTMON) - Intel Corporation - C:\Program Files\Intel\Intel Matrix Storage Manager\IAANTMon.exe

O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: LightScribeService Direct Disc Labeling Service (LightScribeService) - Hewlett-Packard Company - C:\Program Files\Common Files\LightScribe\LSSrvc.exe

O23 - Service: MBAMScheduler - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe

O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe

O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files\Mozilla Maintenance Service\maintenanceservice.exe

O23 - Service: Norton 360 (N360) - Symantec Corporation - C:\Program Files\Norton 360\Engine\20.2.1.22\ccSvcHst.exe

O23 - Service: NortonLive EasySupport - Support.com, Inc. - C:\Program Files\NortonLive EasySupport\esService.exe

O23 - Service: QuickPlay Background Capture Service (QBCS) (QPCapSvc) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\QPCapSvc.exe

O23 - Service: QuickPlay Task Scheduler (QTS) (QPSched) - Unknown owner - C:\Program Files\HP\QuickPlay\Kernel\TV\QPSched.exe

O23 - Service: Cyberlink RichVideo Service(CRVS) (RichVideo) - Unknown owner - C:\Program Files\CyberLink\Shared Files\RichVideo.exe

O23 - Service: SBSD Security Center Service (SBSDWSCService) - Safer Networking Ltd. - C:\Program Files\Spybot - Search & Destroy\SDWinSec.exe

O23 - Service: ServiceLayer - Nokia - C:\Program Files\PC Connectivity Solution\ServiceLayer.exe

O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files\Skype\Updater\Updater.exe

O23 - Service: SupportSoft Sprocket Service (verizondm) (sprtsvc_verizondm) - SupportSoft, Inc. - C:\Program Files\VERIZONDM\bin\sprtsvc.exe

O23 - Service: SupportSoft Repair Service (verizondm) (tgsrvc_verizondm) - SupportSoft, Inc. - C:\Program Files\VERIZONDM\bin\tgsrvc.exe

--

End of file - 12875 bytes

Link to post
Share on other sites

  • Staff

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional

These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis (rightclick and run as admin)
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [sMSERIAL] C:\Program Files\Motorola\SMSERIAL\sm56hlpr.exe
      O4 - HKLM\..\Run: [iAAnotif] C:\Program Files\Intel\Intel Matrix Storage Manager\iaanotif.exe
      O4 - HKLM\..\Run: [QlbCtrl] %ProgramFiles%\Hewlett-Packard\HP Quick Launch Buttons\QlbCtrl.exe /Start
      O4 - HKLM\..\Run: [HP Health Check Scheduler] c:\Program Files\Hewlett-Packard\HP Health Check\HPHC_Scheduler.exe
      O4 - HKLM\..\Run: [HP Software Update] C:\Program Files\Hp\HP Software Update\HPWuSchd2.exe
      O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files\Common Files\Apple\Apple Application Support\APSDaemon.exe"
      O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files\QuickTime\QTTask.exe" -atboottime
      O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
      O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun
      O4 - HKCU\..\Run: [WMPNSCFG] C:\Program Files\Windows Media Player\WMPNSCFG.exe
      O4 - HKCU\..\Run: [Vidyo Desktop] C:\Program Files\Vidyo\Vidyo Desktop\VidyoDesktop.exe
      O4 - Startup: AutorunsDisabled
      O4 - Global Startup: AutorunsDisabled

[*] Close all open windows and browsers/email, etc...

[*] Click on the "Fix Checked" button

[*] When completed, close the application.

  • NOTE**You can research each of those lines
>here< and see if you want to keep them or not
just copy the name between the brackets and paste into the search space
O4 - HKLM\..\Run: [IntelliPoint]

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start

    [*]When asked, allow the add/on to be installed

    • Click Start

    [*]Make sure that the option Remove found threats is unticked

    [*]Click on Advanced Settings, ensure the options

    • Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.

    [*]Click Scan

    [*]wait for the virus definitions to be downloaded

    [*]Wait for the scan to finish

When the scan is complete

  • If no threats were found
    • put a checkmark in "Uninstall application on close"
    • close program
    • report to me that nothing was found

  • If threats were found
    • click on "list of threats found"
    • click on "export to text file" and save it as ESET SCAN and save to the desktop
    • Click on back
    • put a checkmark in "Uninstall application on close"
    • click on finish
    • close program
    • copy and paste the report here

Gringo

Link to post
Share on other sites

  • Staff

Please download Kaspersky Virus Removal Tool and SAVE it to your desktop

  • Right click and run as admin (xp please double click to run)
  • select lang
  • accept the license aggreement
  • click on settings (gear looking thing on the right)
  • put check mark in
    • system memory
      hidden objects
      disk boot sectors
      computer

[*]go back to automatic scan

[*]click on start scan

[*]For this scan select skip for anything found

[*]when the scan is complete click on the report button (looks like a peace of paper on the right of the gear looking thing)

[*]on the left you will see

  • status
    Detected threats<-- click on this one
    automatic Scan report
    Manual disinfection report

[*]click on the save button

  • save to a location that you can find it ( default is in the document folder)

[*]copy and paste this report in your next post

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.