Jump to content

DDS and ATTACH FILES


Recommended Posts

I have been getting ...more times than listed

:2013/03/08 08:13:33 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 08:13:41 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 08:13:41 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 08:13:49 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

Here is DDS and ATTACH files

DDS (Ver_2012-11-20.01) - NTFS_AMD64

Internet Explorer: 9.0.8112.16464

Run by PhillyT65 at 10:33:58 on 2013-03-11

Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.3571.2124 [GMT -5:00]

.

AV: Microsoft Security Essentials *Enabled/Updated* {3F839487-C7A2-C958-E30C-E2825BA31FB5}

SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

SP: Microsoft Security Essentials *Enabled/Updated* {84E27563-E198-C6D6-D9BC-D9F020245508}

.

============== Running Processes ===============

.

C:\Windows\system32\lsm.exe

C:\Windows\system32\svchost.exe -k DcomLaunch

C:\Windows\system32\svchost.exe -k RPCSS

c:\Program Files\Microsoft Security Client\MsMpEng.exe

C:\Windows\system32\atiesrxx.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted

C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted

C:\Windows\system32\svchost.exe -k LocalService

C:\Windows\system32\svchost.exe -k netsvcs

C:\Windows\system32\svchost.exe -k NetworkService

C:\Windows\system32\svchost.exe -k GPSvcGroup

C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation

C:\Windows\system32\atieclxx.exe

C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork

C:\Windows\System32\spoolsv.exe

C:\Windows\system32\svchost.exe -k defragsvc

C:\Program Files\Hewlett-Packard\HP Client Services\HPClientServices.exe

C:\Windows\system32\taskhost.exe

C:\Windows\system32\Dwm.exe

C:\Windows\Explorer.EXE

C:\Program Files (x86)\Hewlett-Packard\HP Odometer\hpsysdrv.exe

C:\Program Files\Microsoft Security Client\msseces.exe

C:\Program Files (x86)\Hp\HP Software Update\hpwuschd2.exe

C:\Windows\System32\svchost.exe -k NetworkServiceAndNoImpersonation

C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe

C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe

C:\Windows\System32\msdtc.exe

C:\Windows\System32\svchost.exe -k LocalServicePeerNet

C:\Program Files (x86)\PDF Complete\pdfsvc.exe

C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe

C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted

C:\Program Files (x86)\Roxio\RoxioNow Player\RNowSvc.exe

C:\Windows\system32\svchost.exe -k SDRSVC

C:\Windows\System32\svchost.exe -k WerSvcGroup

C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSVC.EXE

C:\Windows\system32\SearchIndexer.exe

C:\Program Files (x86)\Yahoo!\SoftwareUpdate\YahooAUService.exe

C:\Program Files\Common Files\Microsoft Shared\Windows Live\WLIDSvcM.exe

C:\Program Files (x86)\Yahoo!\Messenger\ymsgr_tray.exe

c:\Program Files\Microsoft Security Client\NisSrv.exe

C:\Windows\System32\WUDFHost.exe

c:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\MOM.exe

C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CCC.exe

C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe

C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe

C:\Program Files (x86)\Internet Explorer\IELowutil.exe

C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_11_6_602_171_ActiveX.exe

C:\Windows\system32\taskeng.exe

C:\Windows\system32\SearchProtocolHost.exe

C:\Windows\system32\SearchFilterHost.exe

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\System32\cscript.exe

.

============== Pseudo HJT Report ===============

.

uStart Page = hxxp://my.yahoo.com/

uURLSearchHooks: {81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - <orphaned>

mWinlogon: Userinit = userinit.exe,

BHO: {02478D38-C3F9-4efb-9B51-7695ECA05670} - <orphaned>

ATTACH FILE

.

UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.

IF REQUESTED, ZIP IT UP & ATTACH IT

.

DDS (Ver_2012-11-20.01)

.

Microsoft Windows 7 Home Premium

Boot Device: \Device\HarddiskVolume1

Install Date: 1/7/2013 3:24:28 PM

System Uptime: 3/10/2013 12:52:39 PM (22 hours ago)

.

Motherboard: PEGATRON CORPORATION | | 2ACF

Processor: AMD E2-3200 APU with Radeon HD Graphics | P0 | 2400/100mhz

.

==== Disk Partitions =========================

.

C: is FIXED (NTFS) - 920 GiB total, 882.837 GiB free.

D: is FIXED (NTFS) - 12 GiB total, 1.427 GiB free.

E: is CDROM ()

F: is Removable

.

==== Disabled Device Manager Items =============

.

==== System Restore Points ===================

.

RP29: 2/23/2013 1:14:33 AM - Windows Update

RP30: 2/26/2013 1:22:32 AM - Windows Update

RP31: 2/26/2013 9:16:47 PM - Windows Update

RP32: 3/2/2013 1:11:52 AM - Windows Update

RP33: 3/3/2013 11:17:29 AM - Removed Blio.

RP34: 3/5/2013 5:44:39 PM - Windows Update

RP35: 3/9/2013 12:46:05 AM - Windows Update

RP36: 3/9/2013 8:05:43 AM - Removed Norton Online Backup

RP37: 3/10/2013 12:50:57 PM - Removed Microsoft Office 2010

RP38: 3/10/2013 12:51:35 PM - Removed Microsoft Office Click-to-Run 2010

.

==== Installed Programs ======================

.

Adobe AIR

Adobe Flash Player 11 ActiveX

Agatha Christie - Peril at End House

AMD APP SDK Runtime

AMD Media Foundation Decoders

AMD VISION Engine Control Center

ATI Catalyst Install Manager

Bejeweled 3

Blackhawk Striker 2

Blasterball 3

Bounce Symphony

Cake Mania

Catalyst Control Center - Branding

Catalyst Control Center Graphics Previews Common

Catalyst Control Center InstallProxy

Catalyst Control Center Localization All

ccc-utility64

CCC Help Chinese Standard

CCC Help Chinese Traditional

CCC Help Czech

CCC Help Danish

CCC Help Dutch

CCC Help English

CCC Help Finnish

CCC Help French

CCC Help German

CCC Help Greek

CCC Help Hungarian

CCC Help Italian

CCC Help Japanese

CCC Help Korean

CCC Help Norwegian

CCC Help Polish

CCC Help Portuguese

CCC Help Russian

CCC Help Spanish

CCC Help Swedish

CCC Help Thai

CCC Help Turkish

Chronicles of Albian

Chuzzle Deluxe

Cradle of Rome 2

D3DX10

Farm Frenzy

FATE

FileASSASSIN

Governor of Poker 2 Premium Edition

Hewlett-Packard ACLM.NET v1.2.1.1

HP Auto

HP Client Services

HP Customer Experience Enhancements

HP Games

HP LinkUp

HP MovieStore

HP Odometer

HP Setup

HP Setup Manager

HP Support Assistant

HP Support Information

HP Update

HP Vision Hardware Diagnostics

Jewel Quest: The Sleepless Star - Collector's Edition

Junk Mail filter update

LabelPrint

Mah Jong Medley

Malwarebytes Anti-Malware version 1.70.0.1100

Mesh Runtime

Microsoft .NET Framework 4 Client Profile

Microsoft .NET Framework 4 Extended

Microsoft Application Error Reporting

Microsoft Mathematics

Microsoft Security Client

Microsoft Security Essentials

Microsoft Silverlight

Microsoft SQL Server 2005 Compact Edition [ENU]

Microsoft Visual C++ 2005 Redistributable

Microsoft Visual C++ 2005 Redistributable (x64)

Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.17

Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.4148

Microsoft Visual C++ 2008 Redistributable - x64 9.0.30729.6161

Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.17

Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148

Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161

Microsoft Visual C++ 2010 x64 Redistributable - 10.0.30319

Microsoft Visual C++ 2010 x86 Redistributable - 10.0.30319

Microsoft WSE 3.0 Runtime

MSVCRT

MSVCRT_amd64

MSXML 4.0 SP2 (KB954430)

MSXML 4.0 SP2 (KB973688)

Mystery of Mortlake Mansion

Namco All-Stars: PAC-MAN

PDF Complete Special Edition

Penguins!

Plants vs. Zombies - Game of the Year

PlayReady PC Runtime amd64

PlayReady PC Runtime x86

Poker Superstars III

Polar Bowler

Polar Golfer

Power2Go

PressReader

Realtek High Definition Audio Driver

Recovery Manager

Remote Graphics Receiver

RoxioNow Player

Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2729449)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2736428)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2737019)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2742595)

Security Update for Microsoft .NET Framework 4 Client Profile (KB2789642)

Security Update for Microsoft .NET Framework 4 Extended (KB2487367)

Security Update for Microsoft .NET Framework 4 Extended (KB2656351)

Security Update for Microsoft .NET Framework 4 Extended (KB2736428)

Security Update for Microsoft .NET Framework 4 Extended (KB2742595)

Slingo Supreme

Update for Microsoft .NET Framework 4 Client Profile (KB2468871)

Update for Microsoft .NET Framework 4 Client Profile (KB2533523)

Update for Microsoft .NET Framework 4 Client Profile (KB2600217)

Update for Microsoft .NET Framework 4 Extended (KB2468871)

Update for Microsoft .NET Framework 4 Extended (KB2533523)

Update for Microsoft .NET Framework 4 Extended (KB2600217)

Vacation Quest - The Hawaiian Islands

Virtual Villagers 5 - New Believers

WildTangent Games App (HP Games)

Windows Live Communications Platform

Windows Live Essentials

Windows Live ID Sign-in Assistant

Windows Live Installer

Windows Live Language Selector

Windows Live Mail

Windows Live Mesh

Windows Live Mesh ActiveX Control for Remote Connections

Windows Live Messenger

Windows Live MIME IFilter

Windows Live Movie Maker

Windows Live Photo Common

Windows Live Photo Gallery

Windows Live PIMT Platform

Windows Live Remote Client

Windows Live Remote Client Resources

Windows Live Remote Service

Windows Live Remote Service Resources

Windows Live SOXE

Windows Live SOXE Definitions

Windows Live UX Platform

Windows Live UX Platform Language Pack

Windows Live Writer

Windows Live Writer Resources

Yahoo! Install Manager

Yahoo! Messenger

Yahoo! Software Update

Zinio Reader 4

Zuma Deluxe

.

==== Event Viewer Messages From Past Week ========

.

3/9/2013 8:10:03 AM, Error: Service Control Manager [7022] - The Diagnostic Service Host service hung on starting.

3/7/2013 4:16:57 PM, Error: Microsoft-Windows-DistributedCOM [10016] - The machine-default permission settings do not grant Local Activation permission for the COM Server application with CLSID {9BA05972-F6A8-11CF-A442-00A0C90A8F39} and APPID {9BA05972-F6A8-11CF-A442-00A0C90A8F39} to the user VIGGILANTE\PhillyT65 SID (S-1-5-21-3041398442-320649397-160515667-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

3/11/2013 8:55:58 AM, Error: Microsoft-Windows-DistributedCOM [10016] - The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {D3DCB472-7261-43CE-924B-0704BD730D5F} and APPID {D3DCB472-7261-43CE-924B-0704BD730D5F} to the user VIGGILANTE\PhillyT65 SID (S-1-5-21-3041398442-320649397-160515667-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

3/11/2013 8:55:58 AM, Error: Microsoft-Windows-DistributedCOM [10016] - The application-specific permission settings do not grant Local Activation permission for the COM Server application with CLSID {145B4335-FE2A-4927-A040-7C35AD3180EF} and APPID {145B4335-FE2A-4927-A040-7C35AD3180EF} to the user VIGGILANTE\PhillyT65 SID (S-1-5-21-3041398442-320649397-160515667-1000) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.

3/10/2013 12:53:33 PM, Error: Service Control Manager [7001] - The Routing and Remote Access service depends on the Remote Access Connection Manager service which failed to start because of the following error: The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.

3/10/2013 12:53:33 PM, Error: Service Control Manager [7001] - The Internet Connection Sharing (ICS) service depends on the Remote Access Connection Manager service which failed to start because of the following error: The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.

3/10/2013 12:53:31 PM, Error: Service Control Manager [7009] - A timeout was reached (30000 milliseconds) while waiting for the HP Software Framework Service service to connect.

3/10/2013 12:53:31 PM, Error: Service Control Manager [7000] - The HP Software Framework Service service failed to start due to the following error: The service did not respond to the start or control request in a timely fashion.

3/10/2013 12:53:00 PM, Error: NETLOGON [3095] - This computer is configured as a member of a workgroup, not as a member of a domain. The Netlogon service does not need to run in this configuration.

Link to post
Share on other sites

  • Staff

Hello Stick

Welcome to The Forums!!

Around here they call me Gringo and I'll be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!


  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.

    [*]Please do not attach logs or use code boxes, just copy and paste the text.

    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.

    [*]Please read every post completely before doing anything.

    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

    [*]Please provide feedback about your experience as we go.

    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.

NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-

  • Download Security Check by screen317 from
here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

-AdwCleaner-

  • Please download
AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller or from here
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+

Gringo

Link to post
Share on other sites

Also got...

# AdwCleaner v2.114 - Logfile created 03/11/2013 at 15:10:00

# Updated 05/03/2013 by Xplode

# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)

# User : PhillyT65 - VIGGILANTE

# Boot Mode : Normal

# Running from : C:\Users\PhillyT65\Desktop\adwcleaner.exe

# Option [search]

***** [services] *****

***** [Files / Folders] *****

***** [Registry] *****

Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Found : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}

Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Found : HKU\S-1-5-21-3041398442-320649397-160515667-1000\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16464

[OK] Registry is clean.

*************************

AdwCleaner[R1].txt - [1271 octets] - [11/03/2013 15:10:00]

########## EOF - C:\AdwCleaner[R1].txt - [1331 octets] ##########

Link to post
Share on other sites

SECURITY CHECK

Results of screen317's Security Check version 0.99.61

Windows 7 Service Pack 1 x64 (UAC is enabled)

Internet Explorer 9

``````````````Antivirus/Firewall Check:``````````````

Windows Firewall Enabled!

Microsoft Security Essentials

Antivirus up to date!

`````````Anti-malware/Other Utilities Check:`````````

Malwarebytes Anti-Malware version 1.70.0.1100

````````Process Check: objlist.exe by Laurent````````

Microsoft Security Essentials MSMpEng.exe

Microsoft Security Essentials msseces.exe

Malwarebytes Anti-Malware mbamservice.exe

Malwarebytes Anti-Malware mbamgui.exe

Malwarebytes' Anti-Malware mbamscheduler.exe

`````````````````System Health check`````````````````

Total Fragmentation on Drive C: 0%

````````````````````End of Log``````````````````````

Link to post
Share on other sites

  • Staff

Hello Stick

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

Link 1
Link 2
Link 3

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

Link to post
Share on other sites

Publisher of COMBO FIX couldn't be veridied,,Bleeping Computer link..smart screen filter is OFF

Link 2 is in Spanish

Link 3 just didn't look right to me

All the other stuff I've downloaded can I delete that since I've already sent the files

Is Combo Fix for XP only...I'm runnin Winders 7 Home Premium

Link to post
Share on other sites

Cannot get COMBO FIX in any way shape or form..What started all this is when my MABM runs @ 3am...I was at first getting

2013/03/08 08:13:33 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 08:13:41 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 08:13:41 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 08:13:49 -0600 VIGGILANTE PhillyT65 IP-BLOCK 31.133.33.44 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 11:23:11 -0600 VIGGILANTE PhillyT65 IP-BLOCK 222.69.194.141 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 11:23:11 -0600 VIGGILANTE PhillyT65 IP-BLOCK 222.69.194.141 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 11:23:19 -0600 VIGGILANTE PhillyT65 IP-BLOCK 222.69.194.141 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 11:23:19 -0600 VIGGILANTE PhillyT65 IP-BLOCK 222.69.194.141 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 20:33:41 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 20:33:41 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 20:33:41 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 20:33:49 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 21:17:14 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 21:17:22 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 21:17:22 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 21:17:22 -0600 VIGGILANTE PhillyT65 IP-BLOCK 218.9.122.184 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 23:45:20 -0600 VIGGILANTE PhillyT65 IP-BLOCK 222.69.15.236 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 23:45:20 -0600 VIGGILANTE PhillyT65 IP-BLOCK 222.69.15.236 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 23:45:29 -0600 VIGGILANTE PhillyT65 IP-BLOCK 222.69.15.236 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 23:54:25 -0600 VIGGILANTE PhillyT65 IP-BLOCK 91.214.46.213 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 23:54:33 -0600 VIGGILANTE PhillyT65 IP-BLOCK 91.214.46.213 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 23:54:33 -0600 VIGGILANTE PhillyT65 IP-BLOCK 91.214.46.213 (Type: outgoing, Port: 51901, Process: svchost.exe)

2013/03/08 23:54:33 -0600 VIGGILANTE PhillyT65 IP-BLOCK 91.214.46.213 (Type: outgoing, Port: 51901, Process: svchost.exe)

At least this many on a daily basis...but since then it has narrowed way down to basically 1 IP with maybe 4-5 like the above..

So for now I'll just keep an eyeball on the situation and keep track of the scans..I do appreciate your help with this and should the need arise again I'll be back

The computer hasn't really been slow at all and there have been no popups other than on my trusted sites..

Link to post
Share on other sites

  • Staff

Hello Stick

it will not run or it will not download?

I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.
    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it
    If the forum still complains about it being to long send me everything that is at the end of the report after where it says
    ==================
    Scan finished
    ==================

and I will see if I want to see the whole report

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit

2.Unzip the contents to a folder in a convenient location.

3.Open the folder where the contents were unzipped and run mbar.exe

4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.

5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.

6.Wait while the system shuts down and the cleanup process is performed.

7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.

8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:

  • •Internet access
    •Windows Update
    •Windows Firewall

9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.

10.Verify that your system is now functioning normally.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and MBAR

Gringo

Link to post
Share on other sites

Hello Stick

it will not run or it will not download?

I would like you to try and run these next.

TDSSKiller

Please download the latest version of TDSSKiller from here and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.
  • Put a checkmark beside loaded modules.
  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.
  • Click the Start Scan button.
  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.
  • If malicious objects are found, they will show in the Scan results
  • Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.
    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.
  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here.
    Note** this report can be very long - so if the website gives you an error saying it is to long you may attache it
    If the forum still complains about it being to long send me everything that is at the end of the report after where it says
    ==================
    Scan finished
    ==================

and I will see if I want to see the whole report

Malwarebytes Anti-Rootkit

1.Download Malwarebytes Anti-Rootkit

2.Unzip the contents to a folder in a convenient location.

3.Open the folder where the contents were unzipped and run mbar.exe

4.Follow the instructions in the wizard to update and allow the program to scan your computer for threats.

5.Click on the Cleanup button to remove any threats and reboot if prompted to do so.

6.Wait while the system shuts down and the cleanup process is performed.

7.Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.

8.If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:


  • •Internet access
    •Windows Update
    •Windows Firewall

9.If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included with Malwarebytes Anti-Rootkit and reboot.

10.Verify that your system is now functioning normally.

If you have any problems running either one come back and let me know

please reply with the reports from TDSSKiller and MBAR

Gringo

It would not download ...anyway I tried

Link to post
Share on other sites

Ok...I've been kinda goin back n forth between MBAM...and BLEEPIN COMPUTER...to be honest I've tried everything that's been suggested on both sites...both have made good recomendation and so far nothing has come up on ANY of the scans guess I'll hafta keep an eyeball on the puter ...n see what's what....THANKS for the assistance I reallt appreciate the help

Link to post
Share on other sites

  • Staff

Hello Stick

-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

Please download aswMBR to your desktop.

  • Double click the aswMBR.exe icon to run it
  • it will ask to download extra definitions - ALLOW IT
  • Click the Scan button to start the scan
  • On completion of the scan, click the save log button, save it to your desktop and post it in your next reply.

When you are complete please send me both reports

Gringo

Link to post
Share on other sites

Junkware Removal Tool (JRT) by Thisisu

Version: 4.7.1 (03.12.2013:1)

OS: Windows 7 Home Premium x64

Ran by PhillyT65 on Fri 03/15/2013 at 9:27:19.10

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~~~ Services

~~~ Registry Values

~~~ Registry Keys

Successfully deleted: [Registry Key] hkey_local_machine\software\microsoft\windows\currentversion\explorer\browser helper objects\{02478d38-c3f9-4efb-9b51-7695eca05670}

Successfully deleted: [Registry Key] hkey_current_user\software\microsoft\internet explorer\searchscopes\{2fa28606-de77-4029-af96-b231e3b8f827}

Successfully deleted: [Registry Key] hkey_local_machine\software\microsoft\internet explorer\searchscopes\{2fa28606-de77-4029-af96-b231e3b8f827}

Successfully deleted: [Registry Key] hkey_current_user\software\microsoft\internet explorer\searchscopes\{b7fca997-d0fb-4fe0-8afd-255e89cf9671}

Successfully deleted: [Registry Key] hkey_local_machine\software\microsoft\internet explorer\searchscopes\{b7fca997-d0fb-4fe0-8afd-255e89cf9671}

~~~ Files

~~~ Folders

Successfully deleted: [Folder] "C:\Users\PhillyT65\appdata\local\visi_coupon"

~~~ Event Viewer Logs were cleared

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Scan was completed on Fri 03/15/2013 at 9:35:50.62

End of JRT log

Ran the J R T @ 10 min ago...

Link to post
Share on other sites

aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software

Run date: 2013-03-13 11:38:28

-----------------------------

11:38:28.620 OS Version: Windows x64 6.1.7601 Service Pack 1

11:38:28.635 Number of processors: 2 586 0x100

11:38:28.635 ComputerName: VIGGILANTE UserName: PhillyT65

11:38:31.896 Initialize success

11:38:45.952 Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\0000005b

11:38:45.967 Disk 0 Vendor: ST310005 HP63 Size: 953869MB BusType: 11

11:38:45.983 Disk 0 MBR read successfully

11:38:45.999 Disk 0 MBR scan

11:38:45.999 Disk 0 Windows 7 default MBR code

11:38:46.014 Disk 0 Partition 1 80 (A) 07 HPFS/NTFS NTFS 98 MB offset 2048

11:38:46.030 Disk 0 Partition 2 00 07 HPFS/NTFS NTFS 941826 MB offset 208845

11:38:46.045 Disk 0 Partition 3 00 07 HPFS/NTFS NTFS 11939 MB offset 1929070592

11:38:46.092 Disk 0 scanning C:\Windows\system32\drivers

11:38:52.098 Service scanning

11:39:00.990 Modules scanning

11:39:01.006 Disk 0 trace - called modules:

11:39:01.021 ntoskrnl.exe CLASSPNP.SYS disk.sys amd_xata.sys storport.sys hal.dll amd_sata.sys

11:39:01.021 1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80045fc060]

11:39:01.021 3 CLASSPNP.SYS[fffff8800145143f] -> nt!IofCallDriver -> [0xfffffa8004482ac0]

11:39:01.037 5 amd_xata.sys[fffff88001162d00] -> nt!IofCallDriver -> \Device\0000005b[0xfffffa800447f420]

11:39:01.037 Scan finished successfully

11:39:30.256 Disk 0 MBR has been saved successfully to "C:\Users\PhillyT65\Documents\MBR.dat"

11:39:30.630 The log file has been saved successfully to "C:\Users\PhillyT65\Documents\aswMBR.txt"

aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software

Run date: 2013-03-13 13:40:00

-----------------------------

13:40:00.270 OS Version: Windows x64 6.1.7601 Service Pack 1

13:40:00.270 Number of processors: 2 586 0x100

13:40:00.270 ComputerName: VIGGILANTE UserName: PhillyT65

13:40:04.092 Initialze error C000010E - driver not loaded

13:40:04.389 write error "aswCmnB.dll". The process cannot access the file because it is being used by another process.

13:40:20.802 The log file has been saved successfully to "C:\Users\PhillyT65\Documents\aswMBR.txt"

Link to post
Share on other sites

This mornings scan...I like it when there's no issues...

Machine is runnin good...no issues so far..

My original concern was those OUTGOING IP BLOCKS other than that everything else is fine..."all the ducks are in a row"...Thats the way I like it

Malwarebytes Anti-Malware (PRO) 1.70.0.1100

www.malwarebytes.org

Database version: v2013.03.15.01

Windows 7 Service Pack 1 x64 NTFS

Internet Explorer 9.0.8112.16421

PhillyT65 :: VIGGILANTE [administrator]

Protection: Enabled

3/15/2013 3:00:04 AM

mbam-log-2013-03-15 (03-00-04).txt

Scan type: Full scan (C:\|D:\|)

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 317048

Time elapsed: 40 minute(s), 22 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 0

(No malicious items detected)

(end)

2013/03/15 01:55:28 -0500 VIGGILANTE PhillyT65 MESSAGE Executing scheduled update: Daily

2013/03/15 01:55:35 -0500 VIGGILANTE PhillyT65 MESSAGE Scheduled update executed successfully: database updated from version v2013.03.14.06 to version v2013.03.15.01

2013/03/15 01:55:35 -0500 VIGGILANTE PhillyT65 MESSAGE Starting database refresh

2013/03/15 01:55:35 -0500 VIGGILANTE PhillyT65 MESSAGE Stopping IP protection

2013/03/15 01:55:36 -0500 VIGGILANTE PhillyT65 MESSAGE IP Protection stopped successfully

2013/03/15 01:55:39 -0500 VIGGILANTE PhillyT65 MESSAGE Database refreshed successfully

2013/03/15 01:55:39 -0500 VIGGILANTE PhillyT65 MESSAGE Starting IP protection

2013/03/15 01:55:51 -0500 VIGGILANTE PhillyT65 MESSAGE IP Protection started successfully

2013/03/15 03:00:00 -0500 VIGGILANTE PhillyT65 MESSAGE Executing scheduled scan: Full Scan | Daily

2013/03/15 03:00:00 -0500 VIGGILANTE PhillyT65 MESSAGE Scheduled scan executed successfully

2013/03/15 07:39:40 -0500 VIGGILANTE PhillyT65 MESSAGE Starting database refresh

2013/03/15 07:39:40 -0500 VIGGILANTE PhillyT65 MESSAGE Stopping IP protection

2013/03/15 07:39:41 -0500 VIGGILANTE PhillyT65 MESSAGE IP Protection stopped successfully

2013/03/15 07:39:44 -0500 VIGGILANTE PhillyT65 MESSAGE Database refreshed successfully

2013/03/15 07:39:44 -0500 VIGGILANTE PhillyT65 MESSAGE Starting IP protection

2013/03/15 07:39:56 -0500 VIGGILANTE PhillyT65 MESSAGE IP Protection started successfully

Link to post
Share on other sites

  • Staff

Hello

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

Clean Out Temp Files

  • This small application you may want to keep and use once a week to keep the computer clean.
    Download CCleaner from here http://www.ccleaner.com/
    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. default settings are fine
    • Click Run Cleaner.
    • Close CCleaner.

: Malwarebytes' Anti-Malware :

I see that you have MBAM installed - That is great!! and at this time I would like you to update it and run me a quick scan

  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.

Click OK to either and let MBAM proceed with the disinfection process.

If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Download HijackThis

  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic

"information and logs"

  • In your next post I need the following
  1. Log From MBAM
  2. report from Hijackthis
  3. let me know of any problems you may have had
  4. How is the computer doing now?

Gringo

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.