Jump to content

Infected and unable to remove the offending files.


Recommended Posts

Hello

I seem to have been infected at some point with quite a nasty piece of malware. It has bypassed the MBAM scans and has since started running a bitcoin miner without my knowledge until I noticed quite heavy lag spikes and found the process in my task manager.

The files are not removable in safe mode due to a permission restriction, nor are they removable with the FileAssassin tool. One has embedded itself in the C:\ProgramData folder and has hidden itself completely. I work in IT and have been able to clean infected PC's almost all of the time with success but this has simply got me stumped as I wish to not have to do a complete windows re install unless it is absolutely necessary. Hopefully the much more knowledgeable people here will be able to give some help, which would be greatly appreciated.

Below I have attached the two logs required along with posting the VirusTotal scan analysis of the file that is embedded in Program Data.

Thank you, I look forward to hearing from you.

https://www.virustotal.com/en/file/2b00cee9c18e357150765aff9bcf40316073b7d6ce812232b03776fc2a82e5e0/analysis/1367095024/

attach.txt

dds.txt

Link to post
Share on other sites

  • Staff

Hello AussieRotor

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.

Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!


  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.

    [*]Please do not attach logs or use code boxes, just copy and paste the text.

    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.

    [*]Please read every post completely before doing anything.

    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.

    [*]Please provide feedback about your experience as we go.

    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.

NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.

These are the programs I would like you to run next, if you have any problems with these just skip it and run the next one.

-Security Check-

  • Download Security Check by screen317 from
here.
  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt; please post the contents of that document.

-AdwCleaner-

  • Please download
AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Delete.
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[s1].txt as well.

--RogueKiller--

  • Download & SAVE to your Desktop RogueKiller for 32bit or Roguekiller for 64bit
    • Quit all programs that you may have started.
    • Please disconnect any USB or external drives from the computer before you run this scan!
    • For Vista or Windows 7, right-click and select "Run as Administrator to start"
    • For Windows XP, double-click to start.
    • Wait until Prescan has finished ...
    • Then Click on "Scan" button
    • Wait until the Status box shows "Scan Finished"
    • click on "delete"
    • Wait until the Status box shows "Deleting Finished"
    • Click on "Report" and copy/paste the content of the Notepad into your next reply.
    • The log should be found in RKreport[1].txt on your Desktop
    • Exit/Close RogueKiller+

Gringo

Link to post
Share on other sites

Thank you for the fast response.

Security Check log:

Results of screen317's Security Check version 0.99.63

Windows 7 Service Pack 1 x64 (UAC is disabled!)

Internet Explorer 9

``````````````Antivirus/Firewall Check:``````````````

Windows Firewall Enabled!

Microsoft Security Essentials

Antivirus up to date!

`````````Anti-malware/Other Utilities Check:`````````

Malwarebytes Anti-Malware version 1.75.0.1300

JavaFX 2.1.1

Java 7 Update 15

Java version out of Date!

Adobe Flash Player 11.7.700.169

Google Chrome 26.0.1410.43

Google Chrome 26.0.1410.64

````````Process Check: objlist.exe by Laurent````````

Microsoft Security Essentials MSMpEng.exe

Microsoft Security Essentials msseces.exe

Malwarebytes Anti-Malware mbamservice.exe

Malwarebytes Anti-Malware mbamgui.exe

Malwarebytes' Anti-Malware mbamscheduler.exe

`````````````````System Health check`````````````````

Total Fragmentation on Drive C: 1%

````````````````````End of Log``````````````````````

AdwCleaner log:

# AdwCleaner v2.202 - Logfile created 04/28/2013 at 07:26:54

# Updated 23/04/2013 by Xplode

# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)

# User : Owner - OWNER-PC

# Boot Mode : Normal

# Running from : C:\Users\Owner\Desktop\adwcleaner.exe

# Option [Delete]

***** [services] *****

***** [Files / Folders] *****

***** [Registry] *****

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16421

[OK] Registry is clean.

-\\ Mozilla Firefox v [unable to get version]

File : C:\Users\Owner\AppData\Roaming\Mozilla\Firefox\Profiles\lxpoa002.default\prefs.js

[OK] File is clean.

-\\ Google Chrome v26.0.1410.64

File : C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [3993 octets] - [25/04/2013 03:33:25]

AdwCleaner[R2].txt - [3941 octets] - [25/04/2013 03:37:22]

AdwCleaner[R3].txt - [4060 octets] - [25/04/2013 03:37:49]

AdwCleaner[R4].txt - [1298 octets] - [28/04/2013 07:26:02]

AdwCleaner[s1].txt - [320 octets] - [25/04/2013 03:37:27]

AdwCleaner[s2].txt - [4041 octets] - [25/04/2013 03:37:52]

AdwCleaner[s3].txt - [1360 octets] - [28/04/2013 07:26:34]

AdwCleaner[s4].txt - [1239 octets] - [28/04/2013 07:26:54]

########## EOF - C:\AdwCleaner[s4].txt - [1299 octets] ##########

RogueKiller log:

RogueKiller V8.5.4 _x64_ [Mar 18 2013] by Tigzy

mail : tigzyRK<at>gmail<dot>com

Feedback : http://www.geekstogo.com/forum/files/file/413-roguekiller/

Website : http://tigzy.geekstogo.com/roguekiller.php

Blog : http://tigzyrk.blogspot.com/

Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version

Started in : Normal mode

User : Owner [Admin rights]

Mode : Remove -- Date : 04/28/2013 07:32:24

| ARK || FAK || MBR |

¤¤¤ Bad processes : 0 ¤¤¤

¤¤¤ Registry Entries : 14 ¤¤¤

[RUN][sUSP PATH] HKCU\[...]\Run : RazorU (C:\ProgramData\RazorU0\ttdasndku.exe) [-] -> DELETED

[RUN][sUSP PATH] HKUS\S-1-5-21-985961646-518061414-1208089400-1000[...]\Run : RazorU (C:\ProgramData\RazorU0\ttdasndku.exe) [-] -> DELETED

[RUN][sUSP PATH] HKLM\[...]\Wow6432Node\Run : RazorU (C:\ProgramData\RazorU0\ttdasndku.exe) [-] -> DELETED

[iFEO] HKLM\[...]\hijackthis.exe : Debugger (cx_.exe) -> DELETED

[iFEO] HKLM\[...]\housecalllauncher.exe : Debugger (ef_.exe) -> DELETED

[iFEO] HKLM\[...]\rstrui.exe : Debugger (vx_.exe) -> DELETED

[iFEO] HKLM\[...]\spybotsd.exe : Debugger (ep_.exe) -> DELETED

[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> DELETED

[HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> REPLACED (2)

[HJ] HKLM\[...]\System : EnableLUA (0) -> REPLACED (1)

[HJ DESK] HKCU\[...]\ClassicStartMenu : {59031A47-3F72-44A7-89C5-5595FE6B30EE} (1) -> REPLACED (0)

[HJ DESK] HKCU\[...]\NewStartPanel : {59031A47-3F72-44A7-89C5-5595FE6B30EE} (1) -> REPLACED (0)

[HJ DESK] HKCU\[...]\ClassicStartMenu : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

[HJ DESK] HKCU\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> REPLACED (0)

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [NOT LOADED] ¤¤¤

¤¤¤ HOSTS File: ¤¤¤

--> C:\Windows\system32\drivers\etc\hosts

127.0.0.1 localhost

¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST31000524AS +++++

--- User ---

[MBR] 2867977d3721b599cd28b2bc5419ac56

[bSP] 70bc9bc51b2eb18120bddc56ec85c9e2 : Windows 7/8 MBR Code

Partition table:

0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo

1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 953766 Mo

User = LL1 ... OK!

User = LL2 ... OK!

Finished : << RKreport[2]_D_04282013_02d0732.txt >>

RKreport[1]_S_04282013_02d0731.txt ; RKreport[2]_D_04282013_02d0732.txt

Link to post
Share on other sites

  • Staff

Hello AussieRotor

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.

Link 1
Link 2
Link 3

1. Close any open browsers or any other programs that are open.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.

When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?

Gringo

Link to post
Share on other sites

Combofix log:

ComboFix 13-04-27.04 - Owner 28/04/2013 8:49.2.4 - x64

Microsoft Windows 7 Home Premium 6.1.7601.1.1252.61.1033.18.16335.14057 [GMT 10:00]

Running from: c:\users\Owner\Downloads\Downloads\Security files\ComboFix.exe

AV: Microsoft Security Essentials *Disabled/Updated* {3F839487-C7A2-C958-E30C-E2825BA31FB5}

SP: Microsoft Security Essentials *Disabled/Updated* {84E27563-E198-C6D6-D9BC-D9F020245508}

SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\programdata\RazorU0\ttdasndku.exe

c:\programdata\RazorU01

c:\programdata\RazorU01\ttdasndku.exe

c:\windows\SysWow64\DEBUG.log

.

.

((((((((((((((((((((((((( Files Created from 2013-03-27 to 2013-04-27 )))))))))))))))))))))))))))))))

.

.

2013-04-27 22:54 . 2013-04-27 22:54 -------- d-----w- c:\users\hedev\AppData\Local\temp

2013-04-27 22:54 . 2013-04-27 22:54 -------- d-----w- c:\users\Default\AppData\Local\temp

2013-04-27 22:54 . 2013-04-27 22:54 -------- d-----w- c:\users\Administrator\AppData\Local\temp

2013-04-27 21:29 . 2013-04-10 03:46 9317456 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{604FD64B-33D4-4470-8319-ADA51B9BE4A0}\mpengine.dll

2013-04-27 20:10 . 2013-04-27 20:10 -------- d-----w- c:\users\Owner\AppData\Roaming\EMCO

2013-04-27 20:09 . 2013-04-27 20:09 -------- d-----w- c:\program files\EMCO

2013-04-27 19:59 . 2013-04-27 22:54 -------- d-sh--w- c:\programdata\RazorU0

2013-04-27 19:58 . 2013-04-27 19:58 -------- d-----w- c:\users\Owner\AppData\Roaming\LockHunter

2013-04-27 19:58 . 2013-04-27 19:58 -------- d-----w- c:\program files\LockHunter

2013-04-27 19:23 . 2013-04-27 19:23 -------- d-----w- c:\program files (x86)\FileASSASSIN

2013-04-27 18:58 . 2013-04-27 20:13 -------- d-----w- c:\program files (x86)\Unlocker

2013-04-27 18:45 . 2013-04-27 18:45 -------- d-----w- c:\program files (x86)\CodeStuff

2013-04-26 18:04 . 2013-04-26 18:04 -------- d-----w- c:\users\Owner\AppData\Roaming\MotioninJoy

2013-04-26 18:04 . 2011-12-07 09:42 328712 ----a-w- c:\windows\system32\MijFrc.dll

2013-04-26 18:04 . 2013-04-26 18:04 -------- d-----w- c:\program files\MotioninJoy

2013-04-26 12:04 . 2013-04-10 03:46 9317456 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2013-04-26 05:52 . 2013-04-26 05:52 -------- d-----w- c:\program files (x86)\Nordic Games

2013-04-25 11:54 . 2013-04-25 11:54 -------- d-----w- c:\users\Owner\AppData\Local\Adobe

2013-04-25 11:54 . 2013-04-25 11:54 -------- d-----w- c:\users\Administrator\AppData\Local\Adobe

2013-04-25 11:33 . 2013-04-25 11:33 -------- d-----w- c:\users\Owner\AppData\Roaming\QuickScan

2013-04-25 11:26 . 2013-04-25 11:26 -------- d-----w- c:\program files (x86)\Wolfire

2013-04-24 18:08 . 2013-04-24 18:13 -------- d-----w- c:\users\Owner\AppData\Roaming\Bitcoin

2013-04-24 08:49 . 2013-04-24 08:49 905296 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{DD58CA2A-546D-49FC-B109-7A6EBC8D1B9A}\gapaengine.dll

2013-04-23 21:19 . 2013-04-12 14:45 1656680 ----a-w- c:\windows\system32\drivers\ntfs.sys

2013-04-23 12:00 . 2013-04-23 12:01 -------- d-----w- c:\users\Owner\AppData\Local\JC2MP

2013-04-23 11:59 . 2013-04-23 12:01 -------- d-----w- c:\program files (x86)\JC2-MP

2013-04-22 12:35 . 2004-10-21 16:17 274432 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iscript.dll

2013-04-22 12:35 . 2004-10-21 16:16 180224 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iuser.dll

2013-04-22 12:35 . 2004-10-21 16:18 749568 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iKernel.dll

2013-04-22 12:35 . 2004-10-21 16:17 69715 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\ctor.dll

2013-04-22 12:35 . 2004-10-21 16:16 5632 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\DotNetInstaller.exe

2013-04-22 12:35 . 2013-04-22 12:35 323716 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\setup.dll

2013-04-22 12:35 . 2013-04-22 12:35 192644 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iGdi.dll

2013-04-22 08:22 . 2013-04-22 08:22 -------- d-----w- c:\users\UpdatusUser

2013-04-22 08:22 . 2013-02-10 01:04 6393120 ----a-w- c:\windows\system32\nvcpl.dll

2013-04-22 08:22 . 2013-02-10 01:04 3472672 ----a-w- c:\windows\system32\nvsvc64.dll

2013-04-22 08:22 . 2013-02-10 01:04 877856 ----a-w- c:\windows\system32\nvvsvc.exe

2013-04-22 08:22 . 2013-02-10 01:04 63776 ----a-w- c:\windows\system32\nvshext.dll

2013-04-22 08:22 . 2013-02-09 13:25 3035306 ----a-w- c:\windows\system32\nvcoproc.bin

2013-04-22 08:22 . 2013-02-10 01:04 237856 ----a-w- c:\windows\system32\nvmctray.dll

2013-04-22 08:22 . 2013-04-22 08:22 -------- d-----w- c:\programdata\NVIDIA Corporation

2013-04-20 07:19 . 2013-04-21 06:05 -------- d-----w- c:\users\Owner\AppData\Roaming\DVDVideoSoft

2013-04-20 07:19 . 2013-04-21 05:52 -------- d-----w- c:\program files (x86)\DVDVideoSoft

2013-04-20 07:19 . 2013-04-21 05:52 -------- d-----w- c:\program files (x86)\Common Files\DVDVideoSoft

2013-04-20 07:15 . 2013-04-20 07:15 -------- d-----w- c:\users\Owner\AppData\Local\YouTubeBatchDownloader

2013-04-19 08:08 . 2013-04-19 08:08 -------- d-----w- c:\users\Owner\AppData\Local\Chromium

2013-04-17 09:59 . 2013-04-17 09:59 -------- d-----w- c:\programdata\Bohemia Interactive

2013-04-14 08:21 . 2013-04-14 08:21 310688 ----a-w- c:\windows\system32\javaws.exe

2013-04-14 08:21 . 2013-04-14 08:21 108448 ----a-w- c:\windows\system32\WindowsAccessBridge-64.dll

2013-04-14 08:21 . 2013-04-14 08:21 188832 ----a-w- c:\windows\system32\javaw.exe

2013-04-14 08:21 . 2013-04-14 08:21 188320 ----a-w- c:\windows\system32\java.exe

2013-04-13 17:01 . 2013-02-15 06:08 44032 ----a-w- c:\windows\system32\tsgqec.dll

2013-04-13 17:01 . 2013-02-15 06:02 158720 ----a-w- c:\windows\system32\aaclient.dll

2013-04-13 17:01 . 2013-02-15 04:34 131584 ----a-w- c:\windows\SysWow64\aaclient.dll

2013-04-13 17:01 . 2013-02-15 03:25 36864 ----a-w- c:\windows\SysWow64\tsgqec.dll

2013-04-13 17:01 . 2013-02-15 06:06 3717632 ----a-w- c:\windows\system32\mstscax.dll

2013-04-13 17:01 . 2013-02-15 04:37 3217408 ----a-w- c:\windows\SysWow64\mstscax.dll

2013-04-13 17:01 . 2013-03-01 03:36 3153408 ----a-w- c:\windows\system32\win32k.sys

2013-04-11 15:51 . 2013-04-11 15:51 -------- d-----w- c:\users\Owner\AppData\Local\Black_Tree_Gaming

2013-04-11 15:51 . 2013-04-11 15:51 -------- d-----w- c:\program files\Nexus Mod Manager

2013-04-02 23:53 . 2013-03-15 05:53 1807136 ----a-w- c:\windows\system32\nvdispco6431422.dll

2013-04-02 23:53 . 2013-03-15 05:53 1510176 ----a-w- c:\windows\system32\nvdispgenco6431422.dll

2013-04-02 03:43 . 2013-04-02 03:43 -------- d-----w- c:\program files (x86)\spotflux

2013-04-02 03:43 . 2013-04-02 03:43 -------- d-----w- C:\AI_RecycleBin

2013-03-31 21:09 . 2013-03-31 21:09 -------- d-----w- c:\program files (x86)\ESET

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2013-04-27 18:30 . 2012-08-31 09:17 691592 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe

2013-04-27 18:30 . 2012-07-28 17:30 71048 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl

2013-04-27 14:32 . 2012-07-27 05:56 291088 ----a-w- c:\windows\SysWow64\PnkBstrB.exe

2013-04-27 14:32 . 2012-07-27 05:56 291088 ----a-w- c:\windows\SysWow64\PnkBstrB.xtr

2013-04-26 20:51 . 2012-07-27 05:56 291088 ----a-w- c:\windows\SysWow64\PnkBstrB.ex0

2013-04-14 08:21 . 2012-07-27 02:03 963488 ----a-w- c:\windows\system32\deployJava1.dll

2013-04-14 08:21 . 2012-07-27 02:03 1085344 ----a-w- c:\windows\system32\npDeployJava1.dll

2013-04-04 04:50 . 2012-10-25 23:02 25928 ----a-w- c:\windows\system32\drivers\mbam.sys

2013-04-02 10:34 . 2012-07-27 01:43 282744 ------w- c:\windows\system32\MpSigStub.exe

2013-03-26 16:14 . 2013-03-26 16:14 230864 ----a-w- c:\windows\system32\drivers\truecrypt.sys

2013-03-07 01:21 . 2013-03-07 01:21 38664 ----a-w- c:\windows\system32\drivers\tapSF0901.sys

2013-03-02 16:44 . 2012-07-27 05:56 76888 ----a-w- c:\windows\SysWow64\PnkBstrA.exe

2013-03-01 23:53 . 2012-08-17 18:02 3360624 ----a-w- c:\windows\SysWow64\pbsvc.exe

2013-02-25 18:40 . 2013-02-25 18:40 95648 ----a-w- c:\windows\SysWow64\WindowsAccessBridge-32.dll

2013-02-25 18:40 . 2012-08-02 08:52 782240 ----a-w- c:\windows\SysWow64\deployJava1.dll

2013-02-25 18:40 . 2012-08-02 08:52 861088 ----a-w- c:\windows\SysWow64\npDeployJava1.dll

2013-02-12 05:45 . 2013-03-13 01:09 135168 ----a-w- c:\windows\apppatch\AppPatch64\AcXtrnal.dll

2013-02-12 05:45 . 2013-03-13 01:09 350208 ----a-w- c:\windows\apppatch\AppPatch64\AcLayers.dll

2013-02-12 05:45 . 2013-03-13 01:09 308736 ----a-w- c:\windows\apppatch\AppPatch64\AcGenral.dll

2013-02-12 05:45 . 2013-03-13 01:09 111104 ----a-w- c:\windows\apppatch\AppPatch64\acspecfc.dll

2013-02-12 04:48 . 2013-03-13 01:09 474112 ----a-w- c:\windows\apppatch\AcSpecfc.dll

2013-02-12 04:48 . 2013-03-13 01:09 2176512 ----a-w- c:\windows\apppatch\AcGenral.dll

2013-02-12 04:12 . 2013-03-26 03:22 19968 ----a-w- c:\windows\system32\drivers\usb8023.sys

2013-02-10 03:25 . 2013-02-22 07:15 1807136 ----a-w- c:\windows\system32\nvdispco6420294.dll

2013-02-10 03:25 . 2013-02-22 07:15 1510176 ----a-w- c:\windows\system32\nvdispgenco6420162.dll

2013-02-09 08:43 . 2013-02-09 08:43 555808 ----a-w- c:\windows\SysWow64\nvStreaming.exe

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}]

2013-04-19 11:04 280736 ----a-w- c:\program files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Steam"="c:\program files (x86)\Steam\steam.exe" [2013-04-19 1631144]

"uTorrent"="c:\users\Owner\Downloads\Downloads\InternetDownloads\uTorrent.exe" [2013-01-16 969104]

"RazorU"="c:\programdata\RazorU0\ttdasndku.exe" [2013-04-27 425984]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]

"IAStorIcon"="c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe" [2011-11-29 284440]

"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-05-30 59280]

"AdobeCS6ServiceManager"="c:\program files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe" [2012-03-09 1073312]

"vmware-tray.exe"="c:\program files (x86)\VMware\VMware Workstation\vmware-tray.exe" [2012-08-15 104088]

"RazorU"="c:\programdata\RazorU0\ttdasndku.exe" [2013-04-27 425984]

.

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\

UltraMon.lnk - c:\windows\Installer\{537056B7-32A4-4408-9B54-0341963C7C9C}\IcoUltraMon.ico [2012-11-18 29310]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"ConsentPromptBehaviorUser"= 3 (0x3)

"EnableUIADesktopToggle"= 0 (0x0)

"PromptOnSecureDesktop"= 0 (0x0)

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

.

R1 inriqjti;inriqjti;c:\windows\system32\drivers\inriqjti.sys [x]

R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]

R2 MBAMScheduler;MBAMScheduler;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [2013-04-04 418376]

R2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2013-04-04 701512]

R2 mi-raysat_3dsmax2013_64;mental ray 3.10 Satellite for Autodesk 3ds Max 2013 64-bit;c:\program files\Autodesk\3ds Max 2013\NVIDIA\raysat_3dsmax2013_64server.exe [2011-09-14 86016]

R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe [2012-11-09 160944]

R3 BEService;BattlEye Service;c:\program files (x86)\Common Files\BattlEye\BEService.exe [2013-02-04 49152]

R3 FLEXnet Licensing Service 64;FLEXnet Licensing Service 64;c:\program files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe [2013-02-14 1432400]

R3 KoneFltr;ROCCAT Kone;c:\windows\system32\drivers\Kone.sys [2008-12-10 15488]

R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2013-04-04 25928]

R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [2013-01-20 130008]

R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [2013-01-27 379360]

R3 NLNdisMP;NLNdisMP;c:\windows\system32\DRIVERS\nlndis.sys [x]

R3 NLNdisPT;NetLimiter Ndis Protocol Service;c:\windows\system32\DRIVERS\nlndis.sys [x]

R3 RAMDiskVE;RAMDiskVE;c:\windows\system32\Drivers\RAMDiskVE.sys [2012-09-05 73040]

R3 RTCore64;RTCore64;c:\program files (x86)\MSI Afterburner\RTCore64.sys [2012-10-30 13368]

R3 SwitchBoard;Adobe SwitchBoard;c:\program files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe [2010-02-19 517096]

R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-19 59392]

R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2012-04-25 52736]

R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-07-28 1255736]

R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam64.sys [2008-05-06 14464]

S0 asahci64;asahci64;c:\windows\system32\DRIVERS\asahci64.sys [2012-01-06 49760]

S0 gfibto;gfibto;c:\windows\system32\drivers\gfibto.sys [2012-11-23 14456]

S0 iusb3hcs;Intel® USB 3.0 Host Controller Switch Driver;c:\windows\system32\DRIVERS\iusb3hcs.sys [2012-01-04 16152]

S0 vmci;VMware VMCI Bus Driver;c:\windows\system32\DRIVERS\vmci.sys [2012-07-06 85104]

S0 vsock;vSockets Driver;c:\windows\system32\drivers\vsock.sys [2012-07-06 70256]

S2 DTSAudioSvc;DTSAudioSvc;c:\program files\Realtek\Audio\HDA\DTSU2PAuSrv64.exe [2011-08-05 225280]

S2 Hamachi2Svc;LogMeIn Hamachi Tunneling Engine;c:\program files (x86)\LogMeIn Hamachi\hamachi-2.exe [2012-12-14 2466304]

S2 HiPatchService;Hi-Rez Studios Authenticate and Update Service;c:\program files (x86)\Hi-Rez Studios\HiPatchService.exe [2012-12-04 8704]

S2 IAStorDataMgrSvc;Intel® Rapid Storage Technology;c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe [2011-11-29 13592]

S2 Intel® Capability Licensing Service Interface;Intel® Capability Licensing Service Interface;c:\program files\Intel\iCLS Client\HeciServer.exe [2012-01-10 627936]

S2 Intel® PROSet Monitoring Service;Intel® PROSet Monitoring Service;c:\windows\system32\IProsetMonitor.exe [2011-08-15 178344]

S2 jhi_service;Intel® Dynamic Application Loader Host Interface Service;c:\program files (x86)\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [2012-01-20 161560]

S2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe [2013-02-09 383264]

S2 UltraMonUtility;UltraMon Utility Driver;c:\program files (x86)\Common Files\Realtime Soft\UltraMonMirrorDrv\x64\UltraMonUtility.sys [2008-11-13 20512]

S2 UNS;Intel® Management and Security Application User Notification Service;c:\program files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe [2012-01-20 363800]

S2 VMUSBArbService;VMware USB Arbitration Service;c:\program files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe [2012-08-01 917656]

S2 VMwareHostd;VMware Workstation Server;c:\program files (x86)\VMware\VMware Workstation\vmware-hostd.exe [2012-08-15 15680000]

S2 vstor2-mntapi10-shared;Vstor2 MntApi 1.0 Driver (shared);SysWOW64\drivers\vstor2-mntapi10-shared.sys [x]

S3 asmthub3;ASMedia USB3 Hub Service;c:\windows\system32\DRIVERS\asmthub3.sys [2011-11-03 130536]

S3 asmtxhci;ASMEDIA XHCI Service;c:\windows\system32\DRIVERS\asmtxhci.sys [2011-11-03 395752]

S3 iusb3hub;Intel® USB 3.0 Hub Driver;c:\windows\system32\DRIVERS\iusb3hub.sys [2012-01-04 355096]

S3 iusb3xhc;Intel® USB 3.0 eXtensible Host Controller Driver;c:\windows\system32\DRIVERS\iusb3xhc.sys [2012-01-04 786200]

S3 MotioninJoyXFilter;MotioninJoy Virtual Xinput device Filter Driver;c:\windows\system32\DRIVERS\MijXfilt.sys [2012-05-12 121416]

S3 ScreamBAudioSvc;ScreamBee Audio;c:\windows\system32\drivers\ScreamingBAudio64.sys [2010-07-01 38992]

S3 tapSF0901;Spotflux TAP Device Driver;c:\windows\system32\DRIVERS\tapSF0901.sys [2013-03-07 38664]

.

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]

2013-04-10 17:29 1642448 ----a-w- c:\program files (x86)\Google\Chrome\Application\26.0.1410.64\Installer\chrmstp.exe

.

Contents of the 'Scheduled Tasks' folder

.

2013-04-27 c:\windows\Tasks\Adobe Flash Player Updater.job

- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-08-31 18:30]

.

2013-04-27 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-12-04 16:15]

.

2013-04-27 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-12-04 16:15]

.

.

--------- X64 Entries -----------

.

.

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}]

2013-04-19 11:04 340640 ----a-w- c:\program files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns64.dll

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2011-12-28 6457960]

"RtHDVBg_DTS"="c:\program files\Realtek\Audio\HDA\RAVBg64.exe" [2011-11-15 1156712]

"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2013-01-27 1281512]

"AdobeAAMUpdater-1.0"="c:\program files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe" [2012-04-03 446392]

.

------- Supplementary Scan -------

.

uLocal Page = c:\windows\system32\blank.htm

uStart Page = hxxp://www.abtsystems.com.au/abt/startpage.html

uInternet Settings,ProxyOverride = *.local

IE: Free YouTube Download - c:\program files (x86)\Common Files\DVDVideoSoft\plugins\freeytvdownloader.htm

IE: {{EE932B49-D5C0-4D19-A3DA-CE0849258DE6} - {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} - c:\program files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll

Trusted Zone: clonewarsadventures.com

Trusted Zone: freerealms.com

Trusted Zone: soe.com

Trusted Zone: sony.com

TCP: DhcpNameServer = 192.168.0.1

.

- - - - ORPHANS REMOVED - - - -

.

AddRemove-PunkBusterSvc - c:\windows\system32\pbsvc.exe

AddRemove-Unlocker - c:\program files (x86)\Unlocker\uninst.exe

.

.

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_USERS\S-1-5-21-985961646-518061414-1208089400-1000_Classes\CLSID\{89E88762-FD55-7841-B1E1-FE26956E0FFF}]

@Denied: (A 4) (Everyone)

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Shockwave Flash Object"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"

"ThreadingModel"="Apartment"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]

@="0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]

@="ShockwaveFlash.ShockwaveFlash.11"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="ShockwaveFlash.ShockwaveFlash"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Macromedia Flash Factory Object"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"

"ThreadingModel"="Apartment"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]

@="FlashFactory.FlashFactory.1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="FlashFactory.FlashFactory"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*]

@="?????????????????? v1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*\CLSID]

@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*]

@="?????????????????? v2"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*\CLSID]

@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]

@Denied: (Full) (Everyone)

.

Completion time: 2013-04-28 08:56:09

ComboFix-quarantined-files.txt 2013-04-27 22:56

ComboFix2.txt 2013-04-27 19:13

.

Pre-Run: 326,497,292,288 bytes free

Post-Run: 326,460,567,552 bytes free

.

- - End Of File - - 6CBA6B85F550129EAC7209FFA39011FD

Combofix ran perfectly fine. The only issues is that the "c:\programdata\RazorU0\ttdasndku.exe" is still there, along with it has brought back the other virus that was also in the Program Data folder as well as the bitcoin miner malware again that is located in the appdata/local/temp folder. I'm not sure how, whether it didn't delete the "RazorU0" folder and files or otherwise but it is still hidden in the Program Data folder and running. Any suggestions? Thank you for this help by the way.

Link to post
Share on other sites

  • Staff

Hello AussieRotor

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache::

Folder::
c:\users\Owner\AppData\Roaming\Bitcoin
c:\programdata\RazorU0

File::
c:\programdata\RazorU0\ttdasndku.exe"


Driver::
inriqjti

Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe

CFScriptB-4.gif

This will let ComboFix run again.

Restart if you have to.

Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"

  • In your next post I need the following
  1. report from Combofix
  2. let me know of any problems you may have had
  3. How is the computer doing now after running the script?

Gringo

Link to post
Share on other sites

ComboFix log:

ComboFix 13-04-27.04 - Owner 28/04/2013 12:35:43.3.4 - x64

Microsoft Windows 7 Home Premium 6.1.7601.1.1252.61.1033.18.16335.13536 [GMT 10:00]

Running from: c:\users\Owner\Downloads\Downloads\Security files\ComboFix.exe

Command switches used :: c:\users\Owner\Desktop\CFscript.txt

AV: Microsoft Security Essentials *Disabled/Updated* {3F839487-C7A2-C958-E30C-E2825BA31FB5}

SP: Microsoft Security Essentials *Disabled/Updated* {84E27563-E198-C6D6-D9BC-D9F020245508}

SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

.

FILE ::

"c:\programdata\RazorU0\ttdasndku.exe"

.

.

((((((((((((((((((((((((((((((((((((((( Other Deletions )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

c:\programdata\RazorU0

c:\programdata\RazorU0\ttdasndku.exe

c:\users\Owner\AppData\Roaming\Bitcoin

c:\users\Owner\AppData\Roaming\Bitcoin\.lock

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\blk00000.dat

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\000005.sst

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\000075.sst

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\000076.sst

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\000077.sst

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\000078.log

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\000079.sst

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\CURRENT

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\LOCK

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\LOG

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\index\MANIFEST-000002

c:\users\Owner\AppData\Roaming\Bitcoin\blocks\rev00000.dat

c:\users\Owner\AppData\Roaming\Bitcoin\chainstate\000003.log

c:\users\Owner\AppData\Roaming\Bitcoin\chainstate\000004.log

c:\users\Owner\AppData\Roaming\Bitcoin\chainstate\000005.sst

c:\users\Owner\AppData\Roaming\Bitcoin\chainstate\CURRENT

c:\users\Owner\AppData\Roaming\Bitcoin\chainstate\LOCK

c:\users\Owner\AppData\Roaming\Bitcoin\chainstate\LOG

c:\users\Owner\AppData\Roaming\Bitcoin\chainstate\MANIFEST-000002

c:\users\Owner\AppData\Roaming\Bitcoin\database\log.0000000001

c:\users\Owner\AppData\Roaming\Bitcoin\db.log

c:\users\Owner\AppData\Roaming\Bitcoin\debug.log

c:\users\Owner\AppData\Roaming\Bitcoin\peers.dat

c:\users\Owner\AppData\Roaming\Bitcoin\wallet.dat

.

.

((((((((((((((((((((((((((((((((((((((( Drivers/Services )))))))))))))))))))))))))))))))))))))))))))))))))

.

.

-------\Service_inriqjti

.

.

((((((((((((((((((((((((( Files Created from 2013-03-28 to 2013-04-28 )))))))))))))))))))))))))))))))

.

.

2013-04-28 02:42 . 2013-04-28 02:42 -------- d-----w- c:\users\hedev\AppData\Local\temp

2013-04-28 02:42 . 2013-04-28 02:42 -------- d-----w- c:\users\Default\AppData\Local\temp

2013-04-28 02:42 . 2013-04-28 02:42 -------- d-----w- c:\users\Administrator\AppData\Local\temp

2013-04-28 02:41 . 2013-04-28 02:43 -------- d-sh--w- c:\programdata\RazorU0

2013-04-27 22:59 . 2013-04-10 03:46 9317456 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{6752BE5E-ED56-40BB-B552-FE047923FCF4}\mpengine.dll

2013-04-27 20:10 . 2013-04-27 20:10 -------- d-----w- c:\users\Owner\AppData\Roaming\EMCO

2013-04-27 20:09 . 2013-04-27 20:09 -------- d-----w- c:\program files\EMCO

2013-04-27 19:58 . 2013-04-27 19:58 -------- d-----w- c:\users\Owner\AppData\Roaming\LockHunter

2013-04-27 19:58 . 2013-04-27 19:58 -------- d-----w- c:\program files\LockHunter

2013-04-27 19:23 . 2013-04-27 19:23 -------- d-----w- c:\program files (x86)\FileASSASSIN

2013-04-27 18:58 . 2013-04-27 20:13 -------- d-----w- c:\program files (x86)\Unlocker

2013-04-27 18:45 . 2013-04-27 18:45 -------- d-----w- c:\program files (x86)\CodeStuff

2013-04-26 18:04 . 2013-04-26 18:04 -------- d-----w- c:\users\Owner\AppData\Roaming\MotioninJoy

2013-04-26 18:04 . 2011-12-07 09:42 328712 ----a-w- c:\windows\system32\MijFrc.dll

2013-04-26 18:04 . 2013-04-26 18:04 -------- d-----w- c:\program files\MotioninJoy

2013-04-26 12:04 . 2013-04-10 03:46 9317456 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2013-04-26 05:52 . 2013-04-26 05:52 -------- d-----w- c:\program files (x86)\Nordic Games

2013-04-25 11:54 . 2013-04-25 11:54 -------- d-----w- c:\users\Owner\AppData\Local\Adobe

2013-04-25 11:54 . 2013-04-25 11:54 -------- d-----w- c:\users\Administrator\AppData\Local\Adobe

2013-04-25 11:33 . 2013-04-25 11:33 -------- d-----w- c:\users\Owner\AppData\Roaming\QuickScan

2013-04-25 11:26 . 2013-04-25 11:26 -------- d-----w- c:\program files (x86)\Wolfire

2013-04-24 08:49 . 2013-04-24 08:49 905296 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{DD58CA2A-546D-49FC-B109-7A6EBC8D1B9A}\gapaengine.dll

2013-04-23 21:19 . 2013-04-12 14:45 1656680 ----a-w- c:\windows\system32\drivers\ntfs.sys

2013-04-23 12:00 . 2013-04-23 12:01 -------- d-----w- c:\users\Owner\AppData\Local\JC2MP

2013-04-23 11:59 . 2013-04-23 12:01 -------- d-----w- c:\program files (x86)\JC2-MP

2013-04-22 12:35 . 2004-10-21 16:17 274432 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iscript.dll

2013-04-22 12:35 . 2004-10-21 16:16 180224 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iuser.dll

2013-04-22 12:35 . 2004-10-21 16:18 749568 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iKernel.dll

2013-04-22 12:35 . 2004-10-21 16:17 69715 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\ctor.dll

2013-04-22 12:35 . 2004-10-21 16:16 5632 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\DotNetInstaller.exe

2013-04-22 12:35 . 2013-04-22 12:35 323716 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\setup.dll

2013-04-22 12:35 . 2013-04-22 12:35 192644 ----a-w- c:\program files (x86)\Common Files\InstallShield\Professional\RunTime\10\50\Intel32\iGdi.dll

2013-04-22 08:22 . 2013-04-22 08:22 -------- d-----w- c:\users\UpdatusUser

2013-04-22 08:22 . 2013-02-10 01:04 6393120 ----a-w- c:\windows\system32\nvcpl.dll

2013-04-22 08:22 . 2013-02-10 01:04 3472672 ----a-w- c:\windows\system32\nvsvc64.dll

2013-04-22 08:22 . 2013-02-10 01:04 877856 ----a-w- c:\windows\system32\nvvsvc.exe

2013-04-22 08:22 . 2013-02-10 01:04 63776 ----a-w- c:\windows\system32\nvshext.dll

2013-04-22 08:22 . 2013-02-09 13:25 3035306 ----a-w- c:\windows\system32\nvcoproc.bin

2013-04-22 08:22 . 2013-02-10 01:04 237856 ----a-w- c:\windows\system32\nvmctray.dll

2013-04-22 08:22 . 2013-04-22 08:22 -------- d-----w- c:\programdata\NVIDIA Corporation

2013-04-20 07:19 . 2013-04-21 06:05 -------- d-----w- c:\users\Owner\AppData\Roaming\DVDVideoSoft

2013-04-20 07:19 . 2013-04-21 05:52 -------- d-----w- c:\program files (x86)\DVDVideoSoft

2013-04-20 07:19 . 2013-04-21 05:52 -------- d-----w- c:\program files (x86)\Common Files\DVDVideoSoft

2013-04-20 07:15 . 2013-04-20 07:15 -------- d-----w- c:\users\Owner\AppData\Local\YouTubeBatchDownloader

2013-04-19 08:08 . 2013-04-19 08:08 -------- d-----w- c:\users\Owner\AppData\Local\Chromium

2013-04-17 09:59 . 2013-04-17 09:59 -------- d-----w- c:\programdata\Bohemia Interactive

2013-04-14 08:21 . 2013-04-14 08:21 310688 ----a-w- c:\windows\system32\javaws.exe

2013-04-14 08:21 . 2013-04-14 08:21 108448 ----a-w- c:\windows\system32\WindowsAccessBridge-64.dll

2013-04-14 08:21 . 2013-04-14 08:21 188832 ----a-w- c:\windows\system32\javaw.exe

2013-04-14 08:21 . 2013-04-14 08:21 188320 ----a-w- c:\windows\system32\java.exe

2013-04-13 17:01 . 2013-02-15 06:08 44032 ----a-w- c:\windows\system32\tsgqec.dll

2013-04-13 17:01 . 2013-02-15 06:02 158720 ----a-w- c:\windows\system32\aaclient.dll

2013-04-13 17:01 . 2013-02-15 04:34 131584 ----a-w- c:\windows\SysWow64\aaclient.dll

2013-04-13 17:01 . 2013-02-15 03:25 36864 ----a-w- c:\windows\SysWow64\tsgqec.dll

2013-04-13 17:01 . 2013-02-15 06:06 3717632 ----a-w- c:\windows\system32\mstscax.dll

2013-04-13 17:01 . 2013-02-15 04:37 3217408 ----a-w- c:\windows\SysWow64\mstscax.dll

2013-04-13 17:01 . 2013-03-01 03:36 3153408 ----a-w- c:\windows\system32\win32k.sys

2013-04-11 15:51 . 2013-04-11 15:51 -------- d-----w- c:\users\Owner\AppData\Local\Black_Tree_Gaming

2013-04-11 15:51 . 2013-04-11 15:51 -------- d-----w- c:\program files\Nexus Mod Manager

2013-04-02 23:53 . 2013-03-15 05:53 1807136 ----a-w- c:\windows\system32\nvdispco6431422.dll

2013-04-02 23:53 . 2013-03-15 05:53 1510176 ----a-w- c:\windows\system32\nvdispgenco6431422.dll

2013-04-02 03:43 . 2013-04-02 03:43 -------- d-----w- c:\program files (x86)\spotflux

2013-04-02 03:43 . 2013-04-02 03:43 -------- d-----w- C:\AI_RecycleBin

2013-03-31 21:09 . 2013-03-31 21:09 -------- d-----w- c:\program files (x86)\ESET

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2013-04-27 23:48 . 2012-07-27 05:56 291088 ----a-w- c:\windows\SysWow64\PnkBstrB.exe

2013-04-27 23:48 . 2012-07-27 05:56 291088 ----a-w- c:\windows\SysWow64\PnkBstrB.xtr

2013-04-27 23:44 . 2012-07-27 05:56 291088 ----a-w- c:\windows\SysWow64\PnkBstrB.ex0

2013-04-27 18:30 . 2012-08-31 09:17 691592 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe

2013-04-27 18:30 . 2012-07-28 17:30 71048 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl

2013-04-14 08:21 . 2012-07-27 02:03 963488 ----a-w- c:\windows\system32\deployJava1.dll

2013-04-14 08:21 . 2012-07-27 02:03 1085344 ----a-w- c:\windows\system32\npDeployJava1.dll

2013-04-04 04:50 . 2012-10-25 23:02 25928 ----a-w- c:\windows\system32\drivers\mbam.sys

2013-04-02 10:34 . 2012-07-27 01:43 282744 ------w- c:\windows\system32\MpSigStub.exe

2013-03-26 16:14 . 2013-03-26 16:14 230864 ----a-w- c:\windows\system32\drivers\truecrypt.sys

2013-03-07 01:21 . 2013-03-07 01:21 38664 ----a-w- c:\windows\system32\drivers\tapSF0901.sys

2013-03-02 16:44 . 2012-07-27 05:56 76888 ----a-w- c:\windows\SysWow64\PnkBstrA.exe

2013-03-01 23:53 . 2012-08-17 18:02 3360624 ----a-w- c:\windows\SysWow64\pbsvc.exe

2013-02-25 18:40 . 2013-02-25 18:40 95648 ----a-w- c:\windows\SysWow64\WindowsAccessBridge-32.dll

2013-02-25 18:40 . 2012-08-02 08:52 782240 ----a-w- c:\windows\SysWow64\deployJava1.dll

2013-02-25 18:40 . 2012-08-02 08:52 861088 ----a-w- c:\windows\SysWow64\npDeployJava1.dll

2013-02-12 05:45 . 2013-03-13 01:09 135168 ----a-w- c:\windows\apppatch\AppPatch64\AcXtrnal.dll

2013-02-12 05:45 . 2013-03-13 01:09 350208 ----a-w- c:\windows\apppatch\AppPatch64\AcLayers.dll

2013-02-12 05:45 . 2013-03-13 01:09 308736 ----a-w- c:\windows\apppatch\AppPatch64\AcGenral.dll

2013-02-12 05:45 . 2013-03-13 01:09 111104 ----a-w- c:\windows\apppatch\AppPatch64\acspecfc.dll

2013-02-12 04:48 . 2013-03-13 01:09 474112 ----a-w- c:\windows\apppatch\AcSpecfc.dll

2013-02-12 04:48 . 2013-03-13 01:09 2176512 ----a-w- c:\windows\apppatch\AcGenral.dll

2013-02-12 04:12 . 2013-03-26 03:22 19968 ----a-w- c:\windows\system32\drivers\usb8023.sys

2013-02-10 03:25 . 2013-02-22 07:15 1807136 ----a-w- c:\windows\system32\nvdispco6420294.dll

2013-02-10 03:25 . 2013-02-22 07:15 1510176 ----a-w- c:\windows\system32\nvdispgenco6420162.dll

2013-02-09 08:43 . 2013-02-09 08:43 555808 ----a-w- c:\windows\SysWow64\nvStreaming.exe

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\~\Browser Helper Objects\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}]

2013-04-19 11:04 280736 ----a-w- c:\program files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Steam"="c:\program files (x86)\Steam\steam.exe" [2013-04-19 1631144]

"uTorrent"="c:\users\Owner\Downloads\Downloads\InternetDownloads\uTorrent.exe" [2013-01-16 969104]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]

"IAStorIcon"="c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe" [2011-11-29 284440]

"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-05-30 59280]

"AdobeCS6ServiceManager"="c:\program files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe" [2012-03-09 1073312]

"vmware-tray.exe"="c:\program files (x86)\VMware\VMware Workstation\vmware-tray.exe" [2012-08-15 104088]

.

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\

UltraMon.lnk - c:\windows\Installer\{537056B7-32A4-4408-9B54-0341963C7C9C}\IcoUltraMon.ico [2012-11-18 29310]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"ConsentPromptBehaviorUser"= 3 (0x3)

"EnableUIADesktopToggle"= 0 (0x0)

"PromptOnSecureDesktop"= 0 (0x0)

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

.

R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]

R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe [2012-11-09 160944]

R3 BEService;BattlEye Service;c:\program files (x86)\Common Files\BattlEye\BEService.exe [2013-02-04 49152]

R3 FLEXnet Licensing Service 64;FLEXnet Licensing Service 64;c:\program files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe [2013-02-14 1432400]

R3 KoneFltr;ROCCAT Kone;c:\windows\system32\drivers\Kone.sys [2008-12-10 15488]

R3 MotioninJoyXFilter;MotioninJoy Virtual Xinput device Filter Driver;c:\windows\system32\DRIVERS\MijXfilt.sys [2012-05-12 121416]

R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [2013-01-20 130008]

R3 NisSrv;Microsoft Network Inspection;c:\program files\Microsoft Security Client\NisSrv.exe [2013-01-27 379360]

R3 NLNdisMP;NLNdisMP;c:\windows\system32\DRIVERS\nlndis.sys [x]

R3 NLNdisPT;NetLimiter Ndis Protocol Service;c:\windows\system32\DRIVERS\nlndis.sys [x]

R3 RAMDiskVE;RAMDiskVE;c:\windows\system32\Drivers\RAMDiskVE.sys [2012-09-05 73040]

R3 RTCore64;RTCore64;c:\program files (x86)\MSI Afterburner\RTCore64.sys [2012-10-30 13368]

R3 SwitchBoard;Adobe SwitchBoard;c:\program files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe [2010-02-19 517096]

R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-19 59392]

R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2012-04-25 52736]

R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-07-28 1255736]

R3 WDC_SAM;WD SCSI Pass Thru driver;c:\windows\system32\DRIVERS\wdcsam64.sys [2008-05-06 14464]

S0 asahci64;asahci64;c:\windows\system32\DRIVERS\asahci64.sys [2012-01-06 49760]

S0 gfibto;gfibto;c:\windows\system32\drivers\gfibto.sys [2012-11-23 14456]

S0 iusb3hcs;Intel® USB 3.0 Host Controller Switch Driver;c:\windows\system32\DRIVERS\iusb3hcs.sys [2012-01-04 16152]

S0 vmci;VMware VMCI Bus Driver;c:\windows\system32\DRIVERS\vmci.sys [2012-07-06 85104]

S0 vsock;vSockets Driver;c:\windows\system32\drivers\vsock.sys [2012-07-06 70256]

S2 DTSAudioSvc;DTSAudioSvc;c:\program files\Realtek\Audio\HDA\DTSU2PAuSrv64.exe [2011-08-05 225280]

S2 Hamachi2Svc;LogMeIn Hamachi Tunneling Engine;c:\program files (x86)\LogMeIn Hamachi\hamachi-2.exe [2012-12-14 2466304]

S2 HiPatchService;Hi-Rez Studios Authenticate and Update Service;c:\program files (x86)\Hi-Rez Studios\HiPatchService.exe [2012-12-04 8704]

S2 IAStorDataMgrSvc;Intel® Rapid Storage Technology;c:\program files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe [2011-11-29 13592]

S2 Intel® Capability Licensing Service Interface;Intel® Capability Licensing Service Interface;c:\program files\Intel\iCLS Client\HeciServer.exe [2012-01-10 627936]

S2 Intel® PROSet Monitoring Service;Intel® PROSet Monitoring Service;c:\windows\system32\IProsetMonitor.exe [2011-08-15 178344]

S2 jhi_service;Intel® Dynamic Application Loader Host Interface Service;c:\program files (x86)\Intel\Intel® Management Engine Components\DAL\jhi_service.exe [2012-01-20 161560]

S2 MBAMScheduler;MBAMScheduler;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [2013-04-04 418376]

S2 MBAMService;MBAMService;c:\program files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [2013-04-04 701512]

S2 mi-raysat_3dsmax2013_64;mental ray 3.10 Satellite for Autodesk 3ds Max 2013 64-bit;c:\program files\Autodesk\3ds Max 2013\NVIDIA\raysat_3dsmax2013_64server.exe [2011-09-14 86016]

S2 Stereo Service;NVIDIA Stereoscopic 3D Driver Service;c:\program files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe [2013-02-09 383264]

S2 UltraMonUtility;UltraMon Utility Driver;c:\program files (x86)\Common Files\Realtime Soft\UltraMonMirrorDrv\x64\UltraMonUtility.sys [2008-11-13 20512]

S2 UNS;Intel® Management and Security Application User Notification Service;c:\program files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe [2012-01-20 363800]

S2 VMUSBArbService;VMware USB Arbitration Service;c:\program files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe [2012-08-01 917656]

S2 VMwareHostd;VMware Workstation Server;c:\program files (x86)\VMware\VMware Workstation\vmware-hostd.exe [2012-08-15 15680000]

S2 vstor2-mntapi10-shared;Vstor2 MntApi 1.0 Driver (shared);SysWOW64\drivers\vstor2-mntapi10-shared.sys [x]

S3 asmthub3;ASMedia USB3 Hub Service;c:\windows\system32\DRIVERS\asmthub3.sys [2011-11-03 130536]

S3 asmtxhci;ASMEDIA XHCI Service;c:\windows\system32\DRIVERS\asmtxhci.sys [2011-11-03 395752]

S3 iusb3hub;Intel® USB 3.0 Hub Driver;c:\windows\system32\DRIVERS\iusb3hub.sys [2012-01-04 355096]

S3 iusb3xhc;Intel® USB 3.0 eXtensible Host Controller Driver;c:\windows\system32\DRIVERS\iusb3xhc.sys [2012-01-04 786200]

S3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2013-04-04 25928]

S3 ScreamBAudioSvc;ScreamBee Audio;c:\windows\system32\drivers\ScreamingBAudio64.sys [2010-07-01 38992]

S3 tapSF0901;Spotflux TAP Device Driver;c:\windows\system32\DRIVERS\tapSF0901.sys [2013-03-07 38664]

.

.

--- Other Services/Drivers In Memory ---

.

*NewlyCreated* - NAL

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]

2013-04-10 17:29 1642448 ----a-w- c:\program files (x86)\Google\Chrome\Application\26.0.1410.64\Installer\chrmstp.exe

.

Contents of the 'Scheduled Tasks' folder

.

2013-04-28 c:\windows\Tasks\Adobe Flash Player Updater.job

- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2012-08-31 18:30]

.

2013-04-28 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-12-04 16:15]

.

2013-04-28 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2012-12-04 16:15]

.

.

--------- X64 Entries -----------

.

.

[HKEY_LOCAL_MACHINE\~\Browser Helper Objects\{EE932B49-D5C0-4D19-A3DA-CE0849258DE6}]

2013-04-19 11:04 340640 ----a-w- c:\program files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns64.dll

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"RTHDVCPL"="c:\program files\Realtek\Audio\HDA\RtkNGUI64.exe" [2011-12-28 6457960]

"RtHDVBg_DTS"="c:\program files\Realtek\Audio\HDA\RAVBg64.exe" [2011-11-15 1156712]

"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2013-01-27 1281512]

"AdobeAAMUpdater-1.0"="c:\program files (x86)\Common Files\Adobe\OOBE\PDApp\UWA\UpdaterStartupUtility.exe" [2012-04-03 446392]

.

------- Supplementary Scan -------

.

uLocal Page = c:\windows\system32\blank.htm

uStart Page = hxxp://www.abtsystems.com.au/abt/startpage.html

uInternet Settings,ProxyOverride = *.local

IE: Free YouTube Download - c:\program files (x86)\Common Files\DVDVideoSoft\plugins\freeytvdownloader.htm

IE: {{EE932B49-D5C0-4D19-A3DA-CE0849258DE6} - {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} - c:\program files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll

Trusted Zone: clonewarsadventures.com

Trusted Zone: freerealms.com

Trusted Zone: soe.com

Trusted Zone: sony.com

TCP: DhcpNameServer = 192.168.0.1

.

- - - - ORPHANS REMOVED - - - -

.

Wow6432Node-HKCU-Run-RazorU - c:\programdata\RazorU0\ttdasndku.exe

Wow6432Node-HKLM-Run-RazorU - c:\programdata\RazorU0\ttdasndku.exe

AddRemove-PunkBusterSvc - c:\windows\system32\pbsvc.exe

AddRemove-Unlocker - c:\program files (x86)\Unlocker\uninst.exe

.

.

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_USERS\S-1-5-21-985961646-518061414-1208089400-1000_Classes\CLSID\{89E88762-FD55-7841-B1E1-FE26956E0FFF}]

@Denied: (A 4) (Everyone)

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_6_602_180_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_6_602_180_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Shockwave Flash Object"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"

"ThreadingModel"="Apartment"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]

@="0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]

@="ShockwaveFlash.ShockwaveFlash.11"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="ShockwaveFlash.ShockwaveFlash"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Macromedia Flash Factory Object"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx"

"ThreadingModel"="Apartment"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]

@="FlashFactory.FlashFactory.1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_6_602_180.ocx, 1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="FlashFactory.FlashFactory"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*]

@="?????????????????? v1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*\CLSID]

@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*]

@="?????????????????? v2"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*\CLSID]

@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]

@Denied: (Full) (Everyone)

.

------------------------ Other Running Processes ------------------------

.

c:\program files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

c:\windows\SysWOW64\PnkBstrA.exe

c:\windows\SysWOW64\vmnat.exe

c:\program files (x86)\VMware\VMware Workstation\vmware-authd.exe

c:\windows\SysWOW64\vmnetdhcp.exe

c:\program files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe

c:\program files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe

.

**************************************************************************

.

Completion time: 2013-04-28 12:47:02 - machine was rebooted

ComboFix-quarantined-files.txt 2013-04-28 02:47

ComboFix2.txt 2013-04-27 22:56

ComboFix3.txt 2013-04-27 19:13

.

Pre-Run: 326,319,935,488 bytes free

Post-Run: 326,271,418,368 bytes free

.

- - End Of File - - 890FFA77F18FB515F140006377B9E650

The script ran perfectly fine, I've restarted the computer and from what I can see the non removable file and the other malware files have since been removed. The folder named "RazorU0" is still there hidden in ProgramData but it has nothing in it at all. I have yet to see any bit coin miner show up on task manager too. Seems to me like it has been completely fixed.

Thank you so much for your help, you have been amazing with the response time and level of support that has been given. I could not have hoped for any better. As soon as I have some money in my bank account I'll be sure to donate to you for the amazing help you have given me.

Thank you once again, your skills are nothing short of astounding.

Sincerely

James

Link to post
Share on other sites

  • Staff

Hello

:P2P Warning!:

IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

Please note that as long as you are using any form of Peer-to-Peer networking and downloading files from non-documented sources, you can expect infestations of malware to occur

Once upon a time, P2P file sharing was fairly safe. That is no longer true. P2P programs form a direct conduit on to your computer, their security measures are easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if your P2P program is not configured correctly, your computer may be sharing more files than you realize. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured program.

Please read these short reports on the dangers of peer-2-peer programs and file sharing.

FBI Cyber Education Letter
File sharing infects 500,000 computers
USAToday
infoworld

These logs are looking allot better. But we still have some work to do.

Please print out these instructions, or copy them to a Notepad file. It will make it easier for you to follow the instructions and complete all of the necessary steps..

uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (Revo does allot better of a job)

  • Programs to remove

    • µTorrent
      Java 7 Update 15
      Java 7 Update 17 (64-bit)
      JavaFX 2.1.1

  • Please download and install
Revo Uninstaller FreeDouble click Revo Uninstaller to run it.
From the list of programs double click on The Program to remove
When prompted if you want to uninstall click Yes.
Be sure the Moderate option is selected then click Next.
The program will run, If prompted again click Yes
when the built-in uninstaller is finished click on Next.
Once the program has searched for leftovers click Next.
Check/tick the bolded items only on the list then click Delete
when prompted click on Yes and then on next.
put a check on any folders that are found and select delete
when prompted select yes then on next
Once done click Finish.

.

Clean Out Temp Files

  • This small application you may want to keep and use once a week to keep the computer clean.
    Download CCleaner from here http://www.ccleaner.com/
    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
    • Click Run Cleaner.
    • Close CCleaner.

: Malwarebytes' Anti-Malware :

I see You have MBAM installed on the computer - that is great!! it is a very good program! I would like you to run a quick scan for me now

  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt

Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.

Click OK to either and let MBAM proceed with the disinfection process.

If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.

Download HijackThis

  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic

"information and logs"

  • In your next post I need the following
  1. Log From MBAM
  2. report from Hijackthis
  3. let me know of any problems you may have had
  4. How is the computer doing now?

Gringo

Link to post
Share on other sites

I uninstalled utorrent previously as I had browsed the forum and realised what problems it can cause.

The other programs to uninstall were removed successfully without any issue.

MBAM log:

Malwarebytes Anti-Malware 1.75.0.1300

www.malwarebytes.org

Database version: v2013.04.27.04

Windows 7 Service Pack 1 x64 NTFS

Internet Explorer 9.0.8112.16421

Owner :: OWNER-PC [administrator]

28/04/2013 1:46:47 PM

mbam-log-2013-04-28 (13-46-47).txt

Scan type: Quick scan

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM

Scan options disabled: P2P

Objects scanned: 268709

Time elapsed: 3 minute(s), 20 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 0

(No malicious items detected)

(end)

HijackThis log:

Logfile of Trend Micro HijackThis v2.0.4

Scan saved at 1:53:41 PM, on 28/04/2013

Platform: Windows 7 SP1 (WinNT 6.00.3505)

MSIE: Unable to get Internet Explorer version!

Boot mode: Normal

Running processes:

C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamgui.exe

C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe

C:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe

C:\Program Files (x86)\Common Files\Realtime Soft\RTSHookInterop\x32\RTSHookInterop.exe

C:\Program Files (x86)\Common Files\Realtime Soft\RTSHookInterop\x32\RTSHookInterop.exe

C:\Program Files (x86)\Steam\Steam.exe

C:\Program Files (x86)\Origin\Origin.exe

C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

C:\Users\Owner\Desktop\HijackThis.exe

R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://www.abtsystems.com.au/abt/startpage.html

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant =

R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch =

R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Local Page =

R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local

R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName =

O2 - BHO: Windows Live ID Sign-in Helper - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll

O2 - BHO: DVDVideoSoft.WebPageAdjuster - {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} - C:\Program Files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll

O4 - HKLM\..\Run: [iAStorIcon] C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorIcon.exe

O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe"

O4 - HKLM\..\Run: [AdobeCS6ServiceManager] "C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe" -launchedbylogin

O4 - HKLM\..\Run: [vmware-tray.exe] "C:\Program Files (x86)\VMware\VMware Workstation\vmware-tray.exe"

O4 - HKCU\..\Run: [steam] "C:\Program Files (x86)\Steam\steam.exe" -silent

O4 - HKCU\..\Run: [uTorrent] "C:\Users\Owner\Downloads\Downloads\InternetDownloads\uTorrent.exe" /MINIMIZED

O4 - HKUS\S-1-5-21-985961646-518061414-1208089400-1005\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'UpdatusUser')

O4 - HKUS\S-1-5-21-985961646-518061414-1208089400-1005\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'UpdatusUser')

O4 - Global Startup: UltraMon.lnk = ?

O8 - Extra context menu item: Free YouTube Download - C:\Program Files (x86)\Common Files\DVDVideoSoft\plugins\freeytvdownloader.htm

O9 - Extra button: Free YouTube Download - {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} - C:\Program Files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll

O9 - Extra 'Tools' menuitem: Free YouTube Download - {EE932B49-D5C0-4D19-A3DA-CE0849258DE6} - C:\Program Files (x86)\Common Files\DVDVideoSoft\bin\IEDownloadMenuAndBtns.dll

O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll

O10 - Unknown file in Winsock LSP: c:\program files (x86)\common files\microsoft shared\windows live\wlidnsp.dll

O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics

O15 - Trusted Zone: *.clonewarsadventures.com

O15 - Trusted Zone: *.freerealms.com

O15 - Trusted Zone: *.soe.com

O15 - Trusted Zone: *.sony.com

O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~2\COMMON~1\Skype\SKYPE4~1.DLL

O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe

O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing)

O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\AppleMobileDeviceService.exe

O23 - Service: BattlEye Service (BEService) - Unknown owner - C:\Program Files (x86)\Common Files\BattlEye\BEService.exe

O23 - Service: Bonjour Service - Apple Inc. - C:\Program Files\Bonjour\mDNSResponder.exe

O23 - Service: DTSAudioSvc - DTS, Inc - C:\Program Files\Realtek\Audio\HDA\DTSU2PAuSrv64.exe

O23 - Service: @%SystemRoot%\system32\efssvc.dll,-100 (EFS) - Unknown owner - C:\Windows\System32\lsass.exe (file missing)

O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing)

O23 - Service: FLEXnet Licensing Service 64 - Flexera Software, Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe

O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files (x86)\Google\Update\GoogleUpdate.exe

O23 - Service: LogMeIn Hamachi Tunneling Engine (Hamachi2Svc) - LogMeIn Inc. - C:\Program Files (x86)\LogMeIn Hamachi\hamachi-2.exe

O23 - Service: Hi-Rez Studios Authenticate and Update Service (HiPatchService) - Hi-Rez Studios - C:\Program Files (x86)\Hi-Rez Studios\HiPatchService.exe

O23 - Service: Intel® Rapid Storage Technology (IAStorDataMgrSvc) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Rapid Storage Technology\IAStorDataMgrSvc.exe

O23 - Service: Intel® Capability Licensing Service Interface - Intel® Corporation - C:\Program Files\Intel\iCLS Client\HeciServer.exe

O23 - Service: Intel® PROSet Monitoring Service - Unknown owner - C:\Windows\system32\IProsetMonitor.exe (file missing)

O23 - Service: iPod Service - Apple Inc. - C:\Program Files\iPod\bin\iPodService.exe

O23 - Service: Intel® Dynamic Application Loader Host Interface Service (jhi_service) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Management Engine Components\DAL\jhi_service.exe

O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)

O23 - Service: Intel® Management and Security Application Local Management Service (LMS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Management Engine Components\LMS\LMS.exe

O23 - Service: MBAMScheduler - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe

O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe

O23 - Service: mental ray 3.10 Satellite for Autodesk 3ds Max 2013 64-bit (mi-raysat_3dsmax2013_64) - Unknown owner - C:\Program Files\Autodesk\3ds Max 2013\NVIDIA\raysat_3dsmax2013_64server.exe

O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing)

O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)

O23 - Service: NVIDIA Display Driver Service (nvsvc) - Unknown owner - C:\Windows\system32\nvvsvc.exe (file missing)

O23 - Service: NVIDIA Update Service Daemon (nvUpdatusService) - NVIDIA Corporation - C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\daemonu.exe

O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe

O23 - Service: PnkBstrB - Unknown owner - C:\Windows\system32\PnkBstrB.exe

O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)

O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing)

O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)

O23 - Service: Sandboxie Service (SbieSvc) - SANDBOXIE L.T.D - C:\Program Files\Sandboxie\SbieSvc.exe

O23 - Service: Skype Updater (SkypeUpdate) - Skype Technologies - C:\Program Files (x86)\Skype\Updater\Updater.exe

O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing)

O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing)

O23 - Service: @%SystemRoot%\system32\sppsvc.exe,-101 (sppsvc) - Unknown owner - C:\Windows\system32\sppsvc.exe (file missing)

O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe

O23 - Service: NVIDIA Stereoscopic 3D Driver Service (Stereo Service) - NVIDIA Corporation - C:\Program Files (x86)\NVIDIA Corporation\3D Vision\nvSCPAPISvr.exe

O23 - Service: Adobe SwitchBoard (SwitchBoard) - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\SwitchBoard\SwitchBoard.exe

O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing)

O23 - Service: Intel® Management and Security Application User Notification Service (UNS) - Intel Corporation - C:\Program Files (x86)\Intel\Intel® Management Engine Components\UNS\UNS.exe

O23 - Service: @%SystemRoot%\system32\vaultsvc.dll,-1003 (VaultSvc) - Unknown owner - C:\Windows\system32\lsass.exe (file missing)

O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing)

O23 - Service: VMware Authorization Service (VMAuthdService) - VMware, Inc. - C:\Program Files (x86)\VMware\VMware Workstation\vmware-authd.exe

O23 - Service: VMware DHCP Service (VMnetDHCP) - VMware, Inc. - C:\Windows\system32\vmnetdhcp.exe

O23 - Service: VMware USB Arbitration Service (VMUSBArbService) - VMware, Inc. - C:\Program Files (x86)\Common Files\VMware\USB\vmware-usbarbitrator64.exe

O23 - Service: VMware NAT Service - VMware, Inc. - C:\Windows\system32\vmnat.exe

O23 - Service: VMware Workstation Server (VMwareHostd) - Unknown owner - C:\Program Files (x86)\VMware\VMware Workstation\vmware-hostd.exe

O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing)

O23 - Service: @%SystemRoot%\system32\Wat\WatUX.exe,-601 (WatAdminSvc) - Unknown owner - C:\Windows\system32\Wat\WatAdminSvc.exe (file missing)

O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing)

O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing)

O23 - Service: @%PROGRAMFILES%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing)

--

End of file - 11077 bytes

Link to post
Share on other sites

  • Staff

Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional

These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.

  • Run HijackThis (rightclick and run as admin)
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe"
      O4 - HKLM\..\Run: [AdobeCS6ServiceManager] "C:\Program Files (x86)\Common Files\Adobe\CS6ServiceManager\CS6ServiceManager.exe" -launchedbylogin
      O4 - HKCU\..\Run: [steam] "C:\Program Files (x86)\Steam\steam.exe" -silent
      O4 - HKCU\..\Run: [uTorrent] "C:\Users\Owner\Downloads\Downloads\InternetDownloads\uTorrent.exe" /MINIMIZED
      O4 - HKUS\S-1-5-21-985961646-518061414-1208089400-1005\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /autoRun (User 'UpdatusUser')
      O4 - HKUS\S-1-5-21-985961646-518061414-1208089400-1005\..\RunOnce: [mctadmin] C:\Windows\System32\mctadmin.exe (User 'UpdatusUser')
      O4 - Global Startup: UltraMon.lnk = ?

[*] Close all open windows and browsers/email, etc...

[*] Click on the "Fix Checked" button

[*] When completed, close the application.

  • NOTE**You can research each of those lines
>here< and see if you want to keep them or not
just copy the name between the brackets and paste into the search space
O4 - HKLM\..\Run: [IntelliPoint]

Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start

    [*]When asked, allow the add/on to be installed

    • Click Start

    [*]Make sure that the option Remove found threats is unticked

    [*]Click on Advanced Settings, ensure the options

    • Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.

    [*]Click Scan

    [*]wait for the virus definitions to be downloaded

    [*]Wait for the scan to finish

When the scan is complete

  • If no threats were found
    • put a checkmark in "Uninstall application on close"
    • close program
    • report to me that nothing was found

  • If threats were found
    • click on "list of threats found"
    • click on "export to text file" and save it as ESET SCAN and save to the desktop
    • Click on back
    • put a checkmark in "Uninstall application on close"
    • click on finish
    • close program
    • copy and paste the report here

Gringo

Link to post
Share on other sites

<p>I removed the start-up entries however the ESET scanner picked up multiple threats</p>

<p> </p>

<p>ESET log:</p>

<p> </p>

<p> </p>

<div>\Program Files (x86)\Direct YouTube Downloader\nv.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/InstallMonetizer.AF application</div>

<div>C:\Qoobox\Quarantine\C\ProgramData\RazorU0\ttdasndku.exe.vir<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Injector.AFPQ trojan</div>

<div>C:\Qoobox\Quarantine\C\ProgramData\RazorU01\ttdasndku.exe.vir<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Injector.AFPQ trojan</div>

<div>C:\Users\Owner\Desktop\Desktop\Free Programs 64bit\CutePDF Printer Installer.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Bundled.Toolbar.Ask.A application</div>

<div>C:\Users\Owner\Desktop\Desktop\James's Files\Stuff\FoxitReader514.0104_enu_Setup.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Bundled.Toolbar.Ask application</div>

<div>C:\Users\Owner\Desktop\Desktop\James's Files\Stuff\icytower15_install.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\CrystalDiskInfo5_2_2Shizuku-en.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\FreemakeVideoConverterSetup.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\setup-direct-youtube-downloader (2).exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Somoto.A application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\uTorrent-v3.2_Installer.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/Adware.Lollipop.D application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\Intrusion.2.v1.0.full-THETA\Intrusion 2[www.adnan-agnesa.blogspot.com].exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/HackTool.Crack.B application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\PenDrive\siw-setup.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\PenDrive\windows-7-service-pack-1.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/SoftonicDownloader.A application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\1500free.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/PrimeCasino application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\asc-setup.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/Toolbar.Widgi application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\pcfix-v204-en.exe<span class="Apple-tab-span" style="white-space:pre"> </span>probably a variant of Win32/Adware.PCFixCleaner application</div>

<div>C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\SoftonicDownloader_for_avg-anti-virus.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/SoftonicDownloader.A application</div>

<div>C:\Users\Owner\Downloads\Downloads\InternetDownloads\driver_fusion_1.5.0.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\InternetDownloads\FreemakeVideoConverterSetup.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\InternetDownloads\FreeWebMVideoConverter.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\InternetDownloads\FreeYouTubeDownload.exe<span class="Apple-tab-span" style="white-space:pre"> </span>Win32/OpenCandy application</div>

<div>C:\Users\Owner\Downloads\Downloads\Security files\Unlocker1.9.1 (1).exe<span class="Apple-tab-span" style="white-space:pre"> </span>multiple threats</div>

<div>C:\Users\Owner\Downloads\Downloads\Security files\Unlocker1.9.1-x64.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Toolbar.Babylon.A application</div>

<div>C:\Users\Owner\Downloads\Downloads\Security files\Unlocker1.9.1.exe<span class="Apple-tab-span" style="white-space:pre"> </span>multiple threats</div>

<div>C:\Users\Owner\Downloads\Downloads\Security files\Logs\RK_Quarantine\ttdasndku.exe.vir<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Injector.AFPQ trojan</div>

<div>C:\Users\Owner\Downloads\Downloads\Torrent File\Undelete Plus 3.0.3.521 + Crack-ASA\undeleteplus_setup_ask.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Bundled.Toolbar.Ask application</div>

<div>C:\Users\Owner\Downloads\Games\Dead Island\Dead Island Riptide\Game.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Injector.AFPQ trojan</div>

<div>C:\Users\Owner\Downloads\Games\Dead Island\Dead Island Riptide\Install.exe<span class="Apple-tab-span" style="white-space:pre"> </span>a variant of Win32/Injector.AFPQ trojan</div>

<div> </div>

Link to post
Share on other sites

  • Staff

Hello AussieRotor

There are some minor things in your online scan that should be removed.

delete files

  • Copy all text in the code box (below)...to Notepad.
    @echo off
    del /f /s /q "C:\Program Files (x86)\Direct YouTube Downloader\nv.exe"
    del /f /s /q "C:\Users\Owner\Desktop\Desktop\Free Programs 64bit\CutePDF Printer Installer.exe"
    del /f /s /q "C:\Users\Owner\Desktop\Desktop\James's Files\Stuff\FoxitReader514.0104_enu_Setup.exe"
    del /f /s /q "C:\Users\Owner\Desktop\Desktop\James's Files\Stuff\icytower15_install.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\CrystalDiskInfo5_2_2Shizuku-en.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\FreemakeVideoConverterSetup.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\setup-direct-youtube-downloader (2).exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\uTorrent-v3.2_Installer.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\Intrusion.2.v1.0.full-THETA\Intrusion 2[www.adnan-agnesa.blogspot.com].exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\PenDrive\siw-setup.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\PenDrive\windows-7-service-pack-1.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\1500free.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\asc-setup.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\pcfix-v204-en.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Files\PenDrive\downloads\SoftonicDownloader_for_avg-anti-virus.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\InternetDownloads\driver_fusion_1.5.0.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\InternetDownloads\FreemakeVideoConverterSetup.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\InternetDownloads\FreeWebMVideoConverter.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\InternetDownloads\FreeYouTubeDownload.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Security files\Unlocker1.9.1 (1).exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Security files\Unlocker1.9.1-x64.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Security files\Unlocker1.9.1.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Security files\Logs\RK_Quarantine\ttdasndku.exe.vir"
    del /f /s /q "C:\Users\Owner\Downloads\Downloads\Torrent File\Undelete Plus 3.0.3.521 + Crack-ASA\undeleteplus_setup_ask.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Games\Dead Island\Dead Island Riptide\Game.exe"
    del /f /s /q "C:\Users\Owner\Downloads\Games\Dead Island\Dead Island Riptide\Install.exe"
    del %0


  • Save the Notepad file on your desktop...as delfile.bat... save type as "All Files"
    It should look like this: batfileicon.gif<--XPvista_bat_icon.png<--vista
  • Double click on delfile.bat to execute it.
    A black CMD window will flash, then disappear...this is normal.
  • The files and folders, if found...will have been deleted and the "delfile.bat" file will also be deleted.

The rest of the Online scan is only reporting backups created during the course of this fix C:\Qoobox\Quarantine\, and/or items located in System Restore's cache C:\System Volume Information\, Whatever is in these folders can't harm you unless you choose to perform a manual restore. the following steps will remove these backups.

Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.

:Why we need to remove some of our tools:

  • Some of the tools we have used to clean your computer were made by fellow malware fighters and are very powerful and if used incorrectly or at the wronge time can make the computer an expensive paper weight.
    They are updated all the time and some of them more than once a day so by the time you are ready to use them again they will already be outdated.
    The following procedures will implement some cleanup procedures to remove these tools. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.

:DeFogger:

Note** Defogger only needs to be run if it was run when we first started. If you have not already run it then skip this.

  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
    • The application window will appear
    • Click the Re-enable button to re-enable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger will now ask to reboot the machine - click OK.

Your Emulation drivers are now re-enabled.

:Uninstall ComboFix:

  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • CF-Uninstall.png

:Remove the rest of our tools:

Please download OTCleanIt and save it to desktop. This tool will remove all the tools we used to clean your pc.

  • Double-click OTCleanIt.exe.
  • Click the CleanUp! button.
  • Select Yes when the "Begin cleanup Process?" prompt appears.
  • If you are prompted to Reboot during the cleanup, select Yes.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so

Note: If you receive a warning from your firewall or other security programs regarding OTCleanIt attempting to contact the internet, please allow it to do so.

About Java

  • During the cleaning process if I found that Java was installed I asked for it to be uninstalled, Many home users will not miss it. If you use OpenOffice, play online games or use business applications which require Java, Then you need to install the latest version and make sure to disable it in your web browsers.
    If an application or website requires it, you should receive a notification indicating that when you attempt to launch that application or access that website.
    Link to download latest version. -
install Java
How to disable java in your web browsers - Disable Java

:The programs you can keep:

Some of the programs that we have used would be a good idea to keep and used often in helping to keep the computer clean. I use these programs on my computer.

Revo Uninstaller Free - this is the uninstaller that I had you download and works allot better than add/remove in windows and has saved me more than once from corrupted installs and uninstalls
CCleaner - This is a good program to clean out temp files, I would use this once a week or before any malware scan to remove unwanted temp files - It has a built in registry cleaner but I would leave that alone and not use any registry cleaner
Malwarebytes' Anti-Malware The Gold standerd today in antimalware scanners

:Security programs:

One of the questions I am asked all the time is "What programs do you use" I have at this time 4 computers in my home and I have this setup on all 4 of them.

  • Microsoft Security Essentials - provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often. (I have upgraded to the paid version of MBAM and I am glad I did)
    Note** If you decide to install MSE you will need to uninstall your present Antivirus

:Security awareness:

It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article

Strong passwords: How to create and use them Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

The other question I am asked all the time is "How can I prevent this from happening again." and the short answer to that is to be aware of what is out there and how to start spotting dangers.

Here are some articles that are must reads and should be read by everybody in your household that uses the internet

internetsafety
Internet Safety for Kids

Here is some more reading for you from some of my colleges

PC Safety and Security - What Do I Need? from my friends at Tech Support Forum
COMPUTER SECURITY - a short guide to staying safer online from my friends at Malware Removal

quoted from Tech Support Forum

Conclusion

There is no such thing as 'perfect security'. This applies to many things, not just computer systems. Using the above guide you should be able to take all the reasonable steps you can to prevent infection. However, the most important part of all this is you, the user. Surf sensibly and think before you download a file or click on a link. Take a few moments to assess the possible risks and you should be able to enjoy all the internet has to offer.

I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Gringo

Link to post
Share on other sites

Thank you for your wonderful help Gringo, I have followed all the instructions and ran the batch file etc. Everything seems to be as good as new again!

I sincerely appreciate the support given by you and will be making a donation as soon as I possibly can for the immense help you have provided, I expect it will be within the next two weeks.

Once again, thanks.

James

Link to post
Share on other sites

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.