Jump to content

Computer Crime & Intellectual Property Nasty Virus


Recommended Posts

I encountered this virus at 11PM EST March 14th and realized once I couldn't even log in through safe mode that this was a pretty nasty virus. What has happened so far (I found a forum that MrCharlie was helping someone with the similar problem) is that I downloaded the farbar tool (version 64bit) and ran the scan on my system and produced the text FRST.txt and I have copied that text and pasted it below. This is where I'm stuck. If anyone could help me (MrCharlie!) I would greatly appreciate it.

Thanks, ryan

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 14-05-2013

Ran by SYSTEM on 15-05-2013 14:40:38

Running from G:\

Windows 7 Home Premium Service Pack 1 (X64) OS Language: English(US)

Internet Explorer Version 9

Boot Mode: Recovery

The current controlset is ControlSet001

ATTENTION!:=====> FRST is updated to run from normal or Safe mode to produce a full FRST.txt log and an extra Addition.txt log.

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [hpsysdrv] c:\program files (x86)\hewlett-packard\HP odometer\hpsysdrv.exe [62768 2008-11-20] (Hewlett-Packard)

HKLM\...\Run: [ProfilerU] C:\Program Files\SmartTechnology\Software\ProfilerU.exe [454144 2013-01-31] (Saitek)

HKLM\...\Run: [saiMfd] C:\Program Files\SmartTechnology\Software\SaiMfd.exe [158208 2013-01-31] (Saitek)

HKLM\...\Run: [MSC] "c:\Program Files\Microsoft Security Client\mssecex.exe" -hide -runkey [x]

HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox] ATTENTION! ====> ZeroAccess

HKLM-x32\...\Run: [startCCC] "c:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun [343168 2011-09-08] (Advanced Micro Devices, Inc.)

HKLM-x32\...\Run: [HP Software Update] c:\Program Files (x86)\HP\HP Software Update\HPWuSchd2.exe [49208 2011-05-10] (Hewlett-Packard)

HKLM-x32\...\Run: [] [x]

HKLM-x32\...\Run: [Norton Online Backup] C:\Program Files (x86)\Symantec\Norton Online Backup\NOBuClient.exe [1155928 2010-06-01] (Symantec Corporation)

HKLM-x32\...\Run: [PDF Complete] C:\Program Files (x86)\PDF Complete\pdfsty.exe [658424 2011-08-12] (PDF Complete Inc)

HKLM-x32\...\Run: [APSDaemon] "C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [59280 2012-11-28] (Apple Inc.)

HKLM-x32\...\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe" [152544 2012-12-12] (Apple Inc.)

HKLM-x32\...\Run: [sunJavaUpdateSched] "C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe" [252848 2012-07-03] (Sun Microsystems, Inc.)

HKLM-x32\...\Run: [DivXUpdate] "C:\Program Files (x86)\DivX\DivX Update\DivXUpdate.exe" /CHECKNOW [1263952 2013-02-12] ()

HKU\Ryan\...\Run: [steam] "C:\Program Files (x86)\Steam\steam.exe" -silent [1635752 2013-05-03] (Valve Corporation)

HKU\Ryan\...\Run: [spotify Web Helper] "C:\Users\Ryan\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe" [1105408 2013-05-03] (Spotify Ltd)

HKU\Ryan\...\Run: [spotify] "C:\Users\Ryan\AppData\Roaming\Spotify\Spotify.exe" /uri spotify:autostart [4573184 2013-05-03] (Spotify Ltd)

HKU\Ryan\...\Run: [qcgce2mrvjq91kk1e7pnbb19m52fx] C:\Users\Ryan\Documents\3c63aa2d.exe [25088 2013-05-14] ()

HKU\Ryan\...\RunOnce: [FlashPlayerUpdate] C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_11_6_602_180_ActiveX.exe -update activex [706776 2013-03-12] (Adobe Systems Incorporated)

HKU\Ryan\...\Winlogon: [shell] cmd.exe [345088 2010-11-20] (Microsoft Corporation) <==== ATTENTION

Startup: C:\ProgramData\Start Menu\Programs\Startup\Bluetooth.lnk

ShortcutTarget: Bluetooth.lnk -> C:\Program Files\WIDCOMM\Bluetooth Software\BTTray.exe (Broadcom Corporation.)

==================== Services (Whitelisted) =================

S2 MsMpSvc; c:\Program Files\Microsoft Security Client\MsMpEng.exe [22056 2013-01-27] ()

S2 NIS; C:\Program Files (x86)\Norton Internet Security\Engine\19.1.0.28\diMaster.dll [303544 2011-08-11] (Symantec Corporation)

S3 NisSrv; c:\Program Files\Microsoft Security Client\NisSrv.exe [379360 2013-01-27] ()

S2 NOBU; C:\Program Files (x86)\Symantec\Norton Online Backup\NOBuAgent.exe [2804568 2010-06-01] (Symantec Corporation)

S2 pdfcDispatcher; C:\Program Files (x86)\PDF Complete\pdfsvc.exe [1128952 2011-08-12] (PDF Complete Inc)

S3 WinDefend; C:\Program Files\Windows Defender\mpsvc.dll [1011712 2009-07-13] ()

==================== Drivers (Whitelisted) ====================

S3 BHDrvx64; C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_19.1.0.28\Definitions\BASHDefs\20120711.001\BHDrvx64.sys [1161376 2012-06-18] (Symantec Corporation)

S3 eeCtrl; C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\eeCtrl64.sys [484512 2012-05-30] (Symantec Corporation)

S3 EraserUtilRebootDrv; C:\Program Files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [138912 2012-06-01] (Symantec Corporation)

S3 IDSVia64; C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_19.1.0.28\Definitions\IPSDefs\20120711.001\IDSvia64.sys [509088 2012-06-18] (Symantec Corporation)

S0 MpFilter; C:\Windows\System32\DRIVERS\MpFilter.sys [230320 2013-01-20] (Microsoft Corporation)

S3 NAVENG; C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_19.1.0.28\Definitions\VirusDefs\20120711.018\ENG64.SYS [120440 2012-07-11] (Symantec Corporation)

S3 NAVEX15; C:\ProgramData\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_19.1.0.28\Definitions\VirusDefs\20120711.018\EX64.SYS [2068600 2012-07-11] (Symantec Corporation)

S3 NisDrv; C:\Windows\System32\DRIVERS\NisDrvWFP.sys [130008 2013-01-20] (Microsoft Corporation)

S3 SaiK0CD7; C:\Windows\System32\DRIVERS\SaiK0CD7.sys [180544 2012-09-20] (Saitek)

S3 SaiMini; C:\Windows\System32\DRIVERS\SaiMini.sys [25120 2013-02-01] (Saitek)

S3 SaiNtBus; C:\Windows\System32\drivers\SaiBus.sys [52640 2013-02-01] (Saitek)

S3 SaiU0CD7; C:\Windows\System32\DRIVERS\SaiU0CD7.sys [47168 2012-09-20] (Saitek)

S3 SymEvent; C:\Windows\system32\Drivers\SYMEVENT64x86.SYS [174200 2012-04-04] (Symantec Corporation)

S3 ccSet_NIS; \SystemRoot\system32\drivers\NISx64\1301000.01C\ccSetx64.sys [x]

S3 SRTSP; \SystemRoot\system32\drivers\NISx64\1301000.01C\SRTSP64.SYS [x]

S3 SRTSPX; \SystemRoot\system32\drivers\NISx64\1301000.01C\SRTSPX64.SYS [x]

S3 SymDS; \SystemRoot\system32\drivers\NISx64\1301000.01C\SYMDS64.SYS [x]

S3 SymEFA; \SystemRoot\system32\drivers\NISx64\1301000.01C\SYMEFA64.SYS [x]

S3 SymIRON; \SystemRoot\system32\drivers\NISx64\1301000.01C\Ironx64.SYS [x]

S3 SymNetS; \SystemRoot\system32\drivers\NISx64\1301000.01C\SYMNETS.SYS [x]

==================== NetSvcs (Whitelisted) ===================

==================== One Month Created Files and Folders ========

2013-05-15 14:40 - 2013-05-15 14:40 - 00000000 ____D C:\FRST

2013-05-14 19:26 - 2013-05-14 19:26 - 00174411 ____A C:\Users\Ryan\AppData\Roaming\2433f433

2013-05-14 19:26 - 2013-05-14 19:26 - 00174394 ____A C:\Users\Ryan\AppData\Local\2433f433

2013-05-14 19:26 - 2013-05-14 19:26 - 00174344 ____A C:\ProgramData\2433f433

2013-05-14 19:26 - 2013-05-14 19:26 - 00025088 ____A C:\Users\Ryan\Documents\3c63aa2d.exe

2013-05-13 18:27 - 2013-05-13 18:28 - 00000000 ____D C:\Users\Ryan\Desktop\MBA Stuff

2013-04-29 07:42 - 2013-04-29 07:42 - 00001945 ____A C:\Windows\epplauncher.mif

2013-04-29 07:42 - 2013-04-29 07:42 - 00000000 ____D C:\Program Files\Microsoft Security Client

2013-04-29 07:42 - 2013-04-29 07:42 - 00000000 ____D C:\Program Files (x86)\Microsoft Security Client

2013-04-29 07:41 - 2013-04-29 07:41 - 13475464 ____A (Microsoft Corporation) C:\Users\Ryan\Downloads\mseinstall.exe

2013-04-28 18:17 - 2013-04-28 18:17 - 00000000 __SHD C:\Windows\SysWOW64\%APPDATA%

2013-04-23 17:53 - 2013-04-12 06:45 - 01656680 ____A (Microsoft Corporation) C:\Windows\System32\Drivers\ntfs.sys

2013-04-19 11:31 - 2013-04-19 11:31 - 00000000 ____D C:\Users\Ryan\AppData\Local\DDMSettings

2013-04-19 11:28 - 2013-04-19 11:28 - 00000000 ____D C:\Program Files\DivX

2013-04-19 11:23 - 2013-04-19 11:29 - 00000000 ____D C:\ProgramData\DivX

2013-04-19 11:23 - 2013-04-19 11:28 - 00000000 ____D C:\Program Files (x86)\DivX

2013-04-15 17:24 - 2013-04-15 17:24 - 00000000 ____D C:\ProgramData\Sun

2013-04-15 17:24 - 2013-04-15 17:23 - 00861088 ____A (Oracle Corporation) C:\Windows\SysWOW64\npDeployJava1.dll

2013-04-15 17:24 - 2013-04-15 17:23 - 00782240 ____A (Oracle Corporation) C:\Windows\SysWOW64\deployJava1.dll

2013-04-15 17:24 - 2013-04-15 17:23 - 00262560 ____A (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe

2013-04-15 17:24 - 2013-04-15 17:23 - 00174496 ____A (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe

2013-04-15 17:24 - 2013-04-15 17:23 - 00174496 ____A (Oracle Corporation) C:\Windows\SysWOW64\java.exe

2013-04-15 17:24 - 2013-04-15 17:23 - 00095648 ____A (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll

2013-04-15 17:23 - 2013-04-15 17:23 - 00000000 ____D C:\ProgramData\McAfee

2013-04-15 17:23 - 2013-04-15 17:23 - 00000000 ____D C:\Program Files (x86)\Java

==================== One Month Modified Files and Folders =======

2013-05-15 14:40 - 2013-05-15 14:40 - 00000000 ____D C:\FRST

2013-05-14 19:47 - 2012-04-04 21:41 - 00000000 ____D C:\ProgramData\PDFC

2013-05-14 19:47 - 2009-07-13 21:08 - 00000006 ___AH C:\Windows\Tasks\SA.DAT

2013-05-14 19:47 - 2009-07-13 20:51 - 00105550 ____A C:\Windows\setupact.log

2013-05-14 19:34 - 2012-05-16 17:58 - 02035430 ____A C:\Windows\WindowsUpdate.log

2013-05-14 19:34 - 2009-07-13 20:45 - 00024608 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0

2013-05-14 19:34 - 2009-07-13 20:45 - 00024608 ___AH C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0

2013-05-14 19:33 - 2009-07-13 21:13 - 00779700 ____A C:\Windows\System32\PerfStringBackup.INI

2013-05-14 19:29 - 2013-02-17 20:40 - 00000890 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job

2013-05-14 19:26 - 2013-05-14 19:26 - 00174411 ____A C:\Users\Ryan\AppData\Roaming\2433f433

2013-05-14 19:26 - 2013-05-14 19:26 - 00174394 ____A C:\Users\Ryan\AppData\Local\2433f433

2013-05-14 19:26 - 2013-05-14 19:26 - 00174344 ____A C:\ProgramData\2433f433

2013-05-14 19:26 - 2013-05-14 19:26 - 00025088 ____A C:\Users\Ryan\Documents\3c63aa2d.exe

2013-05-14 19:26 - 2012-05-31 17:05 - 00000000 ____D C:\Users\Ryan\AppData\Roaming\SoftGrid Client

2013-05-14 19:23 - 2012-05-24 14:45 - 00000000 ____D C:\Users\Ryan\AppData\Roaming\Skype

2013-05-14 19:05 - 2013-02-22 18:17 - 00000830 ____A C:\Windows\Tasks\Adobe Flash Player Updater.job

2013-05-14 18:37 - 2013-02-17 20:40 - 00000894 ____A C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job

2013-05-14 15:51 - 2012-05-24 14:22 - 00000000 ____D C:\Program Files (x86)\Steam

2013-05-14 12:48 - 2012-11-26 18:00 - 00000000 ____D C:\Users\Ryan\AppData\Roaming\Spotify

2013-05-14 02:13 - 2012-11-26 18:02 - 00000000 ____D C:\Users\Ryan\AppData\Local\Spotify

2013-05-13 18:28 - 2013-05-13 18:27 - 00000000 ____D C:\Users\Ryan\Desktop\MBA Stuff

2013-05-13 14:09 - 2012-09-09 06:56 - 00000000 ____D C:\Users\Ryan\AppData\Local\CrashDumps

2013-05-12 19:19 - 2013-03-04 20:36 - 00000000 ___RD C:\Users\Ryan\Desktop\Junk

2013-05-12 19:18 - 2012-05-16 18:00 - 00000000 ____D C:\Users\Ryan\AppData\Local\PDFC

2013-05-10 16:29 - 2012-08-04 23:15 - 00000328 ____A C:\Windows\Tasks\HPCeeScheduleForRyan.job

2013-05-09 17:37 - 2012-05-24 13:46 - 00000000 ____A C:\Windows\System32\HP_ActiveX_Patch_NOT_DETECTED.txt

2013-05-09 17:37 - 2012-05-17 08:27 - 00000052 ____A C:\Windows\SysWOW64\DOErrors.log

2013-05-09 17:35 - 2012-05-17 08:25 - 00000000 ____D C:\Users\Ryan\AppData\Roaming\HpUpdate

2013-05-09 17:35 - 2012-05-17 08:25 - 00000000 ____D C:\Users\Ryan\AppData\Roaming\HP Support Assistant

2013-05-02 07:29 - 2010-11-20 19:27 - 00278800 ____N (Microsoft Corporation) C:\Windows\System32\MpSigStub.exe

2013-05-01 13:58 - 2013-03-02 11:30 - 00000000 ___RD C:\Program Files (x86)\Skype

2013-05-01 13:58 - 2012-04-04 21:29 - 00000000 ____D C:\ProgramData\Skype

2013-04-29 10:31 - 2012-05-16 17:59 - 00000000 ____D C:\Users\Ryan\AppData\Local\VirtualStore

2013-04-29 07:42 - 2013-04-29 07:42 - 00001945 ____A C:\Windows\epplauncher.mif

2013-04-29 07:42 - 2013-04-29 07:42 - 00000000 ____D C:\Program Files\Microsoft Security Client

2013-04-29 07:42 - 2013-04-29 07:42 - 00000000 ____D C:\Program Files (x86)\Microsoft Security Client

2013-04-29 07:41 - 2013-04-29 07:41 - 13475464 ____A (Microsoft Corporation) C:\Users\Ryan\Downloads\mseinstall.exe

2013-04-28 18:17 - 2013-04-28 18:17 - 00000000 __SHD C:\Windows\SysWOW64\%APPDATA%

2013-04-28 18:10 - 2013-01-14 17:47 - 00000436 ____A C:\Windows\System32\Drivers\etc\hosts.ics

2013-04-23 17:44 - 2012-05-16 18:02 - 00058016 ____A C:\Users\Ryan\AppData\Local\GDIPFONTCACHEV1.DAT

2013-04-23 17:42 - 2009-07-13 20:45 - 00279488 ____A C:\Windows\System32\FNTCACHE.DAT

2013-04-19 11:31 - 2013-04-19 11:31 - 00000000 ____D C:\Users\Ryan\AppData\Local\DDMSettings

2013-04-19 11:29 - 2013-04-19 11:23 - 00000000 ____D C:\ProgramData\DivX

2013-04-19 11:28 - 2013-04-19 11:28 - 00000000 ____D C:\Program Files\DivX

2013-04-19 11:28 - 2013-04-19 11:23 - 00000000 ____D C:\Program Files (x86)\DivX

2013-04-19 10:50 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\System32\NDF

2013-04-15 17:24 - 2013-04-15 17:24 - 00000000 ____D C:\ProgramData\Sun

2013-04-15 17:23 - 2013-04-15 17:24 - 00861088 ____A (Oracle Corporation) C:\Windows\SysWOW64\npDeployJava1.dll

2013-04-15 17:23 - 2013-04-15 17:24 - 00782240 ____A (Oracle Corporation) C:\Windows\SysWOW64\deployJava1.dll

2013-04-15 17:23 - 2013-04-15 17:24 - 00262560 ____A (Oracle Corporation) C:\Windows\SysWOW64\javaws.exe

2013-04-15 17:23 - 2013-04-15 17:24 - 00174496 ____A (Oracle Corporation) C:\Windows\SysWOW64\javaw.exe

2013-04-15 17:23 - 2013-04-15 17:24 - 00174496 ____A (Oracle Corporation) C:\Windows\SysWOW64\java.exe

2013-04-15 17:23 - 2013-04-15 17:24 - 00095648 ____A (Oracle Corporation) C:\Windows\SysWOW64\WindowsAccessBridge-32.dll

2013-04-15 17:23 - 2013-04-15 17:23 - 00000000 ____D C:\ProgramData\McAfee

2013-04-15 17:23 - 2013-04-15 17:23 - 00000000 ____D C:\Program Files (x86)\Java

ZeroAccess:

C:\$Recycle.Bin\S-1-5-21-843207835-2334595079-461602815-1000\$9e41ba612bb88fa78adc689fcaaff1db

ZeroAccess:

C:\$Recycle.Bin\S-1-5-18\$9e41ba612bb88fa78adc689fcaaff1db

==================== Known DLLs (Whitelisted) ================

==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit

C:\Windows\System32\wininit.exe => MD5 is legit

C:\Windows\SysWOW64\wininit.exe => MD5 is legit

C:\Windows\explorer.exe => MD5 is legit

C:\Windows\SysWOW64\explorer.exe => MD5 is legit

C:\Windows\System32\svchost.exe => MD5 is legit

C:\Windows\SysWOW64\svchost.exe => MD5 is legit

C:\Windows\System32\services.exe => MD5 is legit

C:\Windows\System32\User32.dll => MD5 is legit

C:\Windows\SysWOW64\User32.dll => MD5 is legit

C:\Windows\System32\userinit.exe => MD5 is legit

C:\Windows\SysWOW64\userinit.exe => MD5 is legit

C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK

HKLM\...\exefile\DefaultIcon: %1 => OK

HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points =========================

Restore point made on: 2013-04-30 17:59:44

Restore point made on: 2013-05-05 06:53:25

Restore point made on: 2013-05-08 12:12:51

==================== Memory info ===========================

Percentage of memory in use: 13%

Total physical RAM: 7666.85 MB

Available physical RAM: 6601.45 MB

Total Pagefile: 7665.05 MB

Available Pagefile: 6590.01 MB

Total Virtual: 8192 MB

Available Virtual: 8191.88 MB

==================== Drives ================================

Drive c: (OS) (Fixed) (Total:914.42 GB) (Free:818.22 GB) NTFS (Disk=0 Partition=2)

Drive e: (HP_RECOVERY) (Fixed) (Total:16.99 GB) (Free:2.12 GB) NTFS (Disk=0 Partition=3) ==>[system with boot components (obtained from reading drive)]

Drive g: () (Removable) (Total:7.54 GB) (Free:0 GB) FAT32 (Disk=1 Partition=1)

Drive x: (Boot) (Fixed) (Total:0.12 GB) (Free:0.12 GB) NTFS

Drive y: (SYSTEM) (Fixed) (Total:0.1 GB) (Free:0.07 GB) NTFS (Disk=0 Partition=1) ==>[system with boot components (obtained from reading drive)]

==================== MBR & Partition Table ==================

========================================================

Disk: 0 (MBR Code: Windows 7 or 8) (Size: 932 GB) (Disk ID: E3239C71)

Partition 1: (Active) - (Size=100 MB) - (Type=07 NTFS)

Partition 2: (Not Active) - (Size=914 GB) - (Type=07 NTFS)

Partition 3: (Not Active) - (Size=17 GB) - (Type=07 NTFS)

========================================================

Disk: 1 (Size: 8 GB) (Disk ID: 73696D20)

Partition 1: (Not Active) - (Size=-4750121984) - (Type=0A)

Partition 2: (Not Active) - (Size=260 GB) - (Type=65)

Partition 3: (Not Active) - (Size=0) - (Type=65)

Partition 4: (Not Active) - (Size=26 MB) - (Type=00)

Last Boot: 2013-05-14 03:41

==================== End Of Log ============================

Link to post
Share on other sites

Please read the following information first.

You're infected with Rootkit.ZeroAccess, a BackDoor Trojan also

BACKDOOR WARNING

------------------------------

One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

http://www.dslreports.com/faq/10451

When Should I Format, How Should I Reinstall

http://www.dslreports.com/faq/10063

I will try my best to clean this machine but I can't guarantee that it will be 100% secure afterwards.

Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.

-----------------------------------------

OK, here you go......this should get you going:

Please download the attached fixlist.txt and copy it to your flashdrive.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options. (as you did before)

Run FRST64 or FRST (which ever one you're using) and press the Fix button just once and wait.

The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

See if the computer boots normally now.

MrC

Link to post
Share on other sites

MrC sorry for the confusion in my posts, the attached text file is pasted below.

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 14-05-2013

Ran by SYSTEM at 2013-05-15 15:33:06 Run:1

Running from G:\

Boot Mode: Recovery

==============================================

HKLM\Software\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\\Default => Value was restored successfully.

HKEY_USERS\Ryan\Software\Microsoft\Windows\CurrentVersion\Run\\qcgce2mrvjq91kk1e7pnbb19m52fx => Value deleted successfully.

HKEY_USERS\Ryan\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\\Shell => Value deleted successfully.

C:\Users\Ryan\Documents\3c63aa2d.exe => Moved successfully.

C:\Users\Ryan\AppData\Roaming\2433f433 => Moved successfully.

C:\Users\Ryan\AppData\Local\2433f433 => Moved successfully.

C:\ProgramData\2433f433 => Moved successfully.

C:\Users\Ryan\Documents\3c63aa2d.exe => File/Directory not found.

C:\$Recycle.Bin\S-1-5-21-843207835-2334595079-461602815-1000\$9e41ba612bb88fa78adc689fcaaff1db => Moved successfully.

C:\$Recycle.Bin\S-1-5-18\$9e41ba612bb88fa78adc689fcaaff1db => Moved successfully.

==== End of Fixlog ====

Link to post
Share on other sites

It has booted normally. Thank you, I believe there are a few scans I should run but I'm very happy getting this to run normally again. I changed all my passwords on everything immediately once I saw this last night as well. I will be paying a visit to your donation section to show my appreciation.

Link to post
Share on other sites

OK, run this scan:

Download Malwarebytes Anti-Rootkit from HERE

  • Unzip the contents to a folder in a convenient location.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
  • Wait while the system shuts down and the cleanup process is performed.
  • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log.txt and system-log.txt

To attach a log if needed:

Bottom right corner of this page.

more-reply-options.jpg

New window that comes up.

choose-files1.jpg

~~~~~~~~~~~~~~~~~~~~~~~

Note:

If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:

Internet access

Windows Update

Windows Firewall

If there are additional problems with your system, such as any of those listed above or other system issues, then run the fixdamage tool included with Malwarebytes Anti-Rootkit and reboot. It's located in the Plugins folder which is in the MBAR folder.

Just run fixdamage.exe.

Verify that your system is now functioning normally.

MrC

Link to post
Share on other sites

System Log:

Malwarebytes Anti-Rootkit BETA 1.05.0.1001

© Malwarebytes Corporation 2011-2012

OS version: 6.1.7601 Windows 7 Service Pack 1 x64

Account is Administrative

Internet Explorer version: 9.0.8112.16421

File system is: NTFS

Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED, Q:\ DRIVE_FIXED

CPU speed: 2.196000 GHz

Memory total: 8039272448, free: 5521616896

------------ Kernel report ------------

05/15/2013 16:13:58

------------ Loaded modules -----------

\SystemRoot\system32\ntoskrnl.exe

\SystemRoot\system32\hal.dll

\SystemRoot\system32\kdcom.dll

\SystemRoot\system32\mcupdate_AuthenticAMD.dll

\SystemRoot\system32\PSHED.dll

\SystemRoot\system32\CLFS.SYS

\SystemRoot\system32\CI.dll

\SystemRoot\system32\drivers\Wdf01000.sys

\SystemRoot\system32\drivers\WDFLDR.SYS

\SystemRoot\system32\drivers\ACPI.sys

\SystemRoot\system32\drivers\WMILIB.SYS

\SystemRoot\system32\drivers\msisadrv.sys

\SystemRoot\system32\drivers\pci.sys

\SystemRoot\system32\drivers\vdrvroot.sys

\SystemRoot\System32\drivers\partmgr.sys

\SystemRoot\system32\drivers\volmgr.sys

\SystemRoot\System32\drivers\volmgrx.sys

\SystemRoot\System32\drivers\mountmgr.sys

\SystemRoot\system32\drivers\amd_sata.sys

\SystemRoot\system32\drivers\storport.sys

\SystemRoot\system32\drivers\amd_xata.sys

\SystemRoot\system32\drivers\amdxata.sys

Mbar Log:

Malwarebytes Anti-Rootkit BETA 1.05.0.1001

www.malwarebytes.org

Database version: v2013.03.22.01

Windows 7 Service Pack 1 x64 NTFS

Internet Explorer 9.0.8112.16421

Ryan :: RYAN-HP [administrator]

5/15/2013 4:22:28 PM

mbar-log-2013-05-15 (16-22-28).txt

Scan type: Quick scan

Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM | P2P

Scan options disabled:

Objects scanned: 30025

Time elapsed: 7 minute(s), 32 second(s)

Memory Processes Detected: 0

(No malicious items detected)

Memory Modules Detected: 0

(No malicious items detected)

Registry Keys Detected: 0

(No malicious items detected)

Registry Values Detected: 0

(No malicious items detected)

Registry Data Items Detected: 0

(No malicious items detected)

Folders Detected: 0

(No malicious items detected)

Files Detected: 0

(No malicious items detected)

(end)

Link to post
Share on other sites

Well Done, lets run ComboFix to clear up any leftovers.

Please download and run ComboFix.

The most important things to remember when running it is to disable all your malware programs and run Combofix from your desktop.

Please visit this webpage for download links, and instructions for running ComboFix

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Information on disabling your malware programs can be found Here.

Make sure you run ComboFix from your desktop.

Give it at least 30-45 minutes to finish if needed.

Please include the C:\ComboFix.txt in your next reply for further review.

---------->NOTE<----------

If you get the message Illegal operation attempted on registry key that has been marked for deletion after you run ComboFix....please reboot the computer, this should resolve the problem. You may have to do this several times if needed.

MrC

Link to post
Share on other sites

ComboFix 13-03-14.02 - Ryan 05/15/2013 17:01:48.1.4 - x64

Microsoft Windows 7 Home Premium 6.1.7601.1.1252.1.1033.18.7667.5998 [GMT -4:00]

Running from: c:\users\Ryan\Desktop\combofix.exe

AV: Norton Internet Security *Disabled/Outdated* {63DF5164-9100-186D-2187-8DC619EFD8BF}

FW: Norton Internet Security *Disabled* {5BE4D041-DB6F-1935-0AD8-24F3E73C9FC4}

SP: Norton Internet Security *Disabled/Outdated* {D8BEB080-B73A-17E3-1B37-B6B462689202}

SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}

* Created a new restore point

.

.

((((((((((((((((((((((((( Files Created from 2013-04-15 to 2013-05-15 )))))))))))))))))))))))))))))))

.

.

2013-05-15 22:40 . 2013-05-15 22:40 -------- d-----w- C:\FRST

2013-05-15 21:14 . 2013-05-15 21:14 -------- d-----w- c:\users\Default\AppData\Local\temp

2013-05-15 20:58 . 2013-05-15 20:58 -------- d-----w- c:\windows\SysWow64\searchplugins

2013-05-15 20:58 . 2013-05-15 20:58 -------- d-----w- c:\windows\SysWow64\Extensions

2013-05-15 20:58 . 2013-05-15 20:58 -------- d-----w- c:\programdata\BrowserProtect

2013-05-15 20:58 . 2013-05-15 20:58 -------- d-----w- c:\users\Ryan\AppData\Roaming\Babylon

2013-05-15 20:58 . 2013-05-15 20:58 -------- d-----w- c:\programdata\Babylon

2013-05-15 20:13 . 2013-05-15 20:13 -------- d-----w- c:\programdata\Malwarebytes

2013-05-15 20:12 . 2013-05-15 20:12 -------- d-----w- c:\users\Ryan\AppData\Local\WinZip

2013-05-15 20:12 . 2013-05-15 20:12 -------- d-----w- c:\programdata\WinZip

2013-05-15 20:12 . 2013-05-15 20:12 -------- d-----w- c:\program files\WinZip

2013-05-11 17:42 . 2013-04-17 10:31 9317456 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{C3533C72-A5AE-44BC-98A1-D543886877E0}\mpengine.dll

2013-05-10 01:36 . 2013-04-17 10:31 9317456 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll

2013-05-01 21:58 . 2013-05-01 21:58 -------- d-----w- c:\program files (x86)\Common Files\Skype

2013-05-01 02:00 . 2013-05-01 01:59 905296 ------w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{7278BABC-C172-42E3-9E54-55E80D145FC3}\gapaengine.dll

2013-04-29 15:42 . 2013-04-29 15:42 -------- d-----w- c:\program files (x86)\Microsoft Security Client

2013-04-29 15:42 . 2013-04-29 15:42 -------- d-----w- c:\program files\Microsoft Security Client

2013-04-29 02:17 . 2013-04-29 02:17 -------- d-sh--w- c:\windows\SysWow64\%APPDATA%

2013-04-27 14:15 . 2013-04-10 03:46 9317456 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{663DA8F6-774A-44DA-A84C-1C87E96342F2}\mpengine.dll

2013-04-24 01:53 . 2013-04-12 14:45 1656680 ----a-w- c:\windows\system32\drivers\ntfs.sys

2013-04-19 19:31 . 2013-04-19 19:31 -------- d-----w- c:\users\Ryan\AppData\Local\DDMSettings

2013-04-19 19:28 . 2013-04-19 19:28 -------- d-----w- c:\program files\DivX

2013-04-19 19:28 . 2013-04-19 19:28 -------- d-----w- c:\program files (x86)\Common Files\DivX Shared

2013-04-19 19:23 . 2013-04-19 19:28 -------- d-----w- c:\program files (x86)\DivX

2013-04-19 19:23 . 2013-04-19 19:29 -------- d-----w- c:\programdata\DivX

2013-04-16 01:24 . 2013-04-16 01:24 -------- d-----w- c:\program files (x86)\Common Files\Java

2013-04-16 01:24 . 2013-04-16 01:23 861088 ----a-w- c:\windows\SysWow64\npDeployJava1.dll

2013-04-16 01:24 . 2013-04-16 01:23 782240 ----a-w- c:\windows\SysWow64\deployJava1.dll

2013-04-16 01:24 . 2013-04-16 01:23 95648 ----a-w- c:\windows\SysWow64\WindowsAccessBridge-32.dll

2013-04-16 01:23 . 2013-04-16 01:23 -------- d-----w- c:\program files (x86)\Java

2013-04-16 01:23 . 2013-04-16 01:23 -------- d-----w- c:\programdata\McAfee

.

.

.

(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))

.

2013-05-15 20:14 . 2013-02-23 02:17 692104 ----a-w- c:\windows\SysWow64\FlashPlayerApp.exe

2013-05-15 20:14 . 2012-04-05 05:37 71048 ----a-w- c:\windows\SysWow64\FlashPlayerCPLApp.cpl

2013-05-02 15:29 . 2010-11-21 03:27 278800 ------w- c:\windows\system32\MpSigStub.exe

2013-03-23 01:09 . 2013-03-23 01:09 354656 ----a-w- c:\windows\SysWow64\DivXControlPanelApplet.cpl

2013-03-19 06:04 . 2013-04-10 13:34 5550424 ----a-w- c:\windows\system32\ntoskrnl.exe

2013-03-19 05:46 . 2013-04-10 13:34 43520 ----a-w- c:\windows\system32\csrsrv.dll

2013-03-19 05:04 . 2013-04-10 13:34 3968856 ----a-w- c:\windows\SysWow64\ntkrnlpa.exe

2013-03-19 05:04 . 2013-04-10 13:34 3913560 ----a-w- c:\windows\SysWow64\ntoskrnl.exe

2013-03-19 04:47 . 2013-04-10 13:34 6656 ----a-w- c:\windows\SysWow64\apisetschema.dll

2013-03-19 03:06 . 2013-04-10 13:34 112640 ----a-w- c:\windows\system32\smss.exe

2013-03-01 03:36 . 2013-04-10 13:34 3153408 ----a-w- c:\windows\system32\win32k.sys

2013-02-22 06:57 . 2013-04-11 07:00 17817088 ----a-w- c:\windows\system32\mshtml.dll

2013-02-22 06:29 . 2013-04-11 07:00 10925568 ----a-w- c:\windows\system32\ieframe.dll

2013-02-22 06:27 . 2013-04-11 07:01 2312704 ----a-w- c:\windows\system32\jscript9.dll

2013-02-22 06:21 . 2013-04-11 07:01 1346560 ----a-w- c:\windows\system32\urlmon.dll

2013-02-22 06:20 . 2013-04-11 07:01 1392128 ----a-w- c:\windows\system32\wininet.dll

2013-02-22 06:19 . 2013-04-11 07:01 1494528 ----a-w- c:\windows\system32\inetcpl.cpl

2013-02-22 06:18 . 2013-04-11 07:01 237056 ----a-w- c:\windows\system32\url.dll

2013-02-22 06:17 . 2013-04-11 07:01 85504 ----a-w- c:\windows\system32\jsproxy.dll

2013-02-22 06:15 . 2013-04-11 07:01 173056 ----a-w- c:\windows\system32\ieUnatt.exe

2013-02-22 06:15 . 2013-04-11 07:01 599040 ----a-w- c:\windows\system32\vbscript.dll

2013-02-22 06:15 . 2013-04-11 07:01 816640 ----a-w- c:\windows\system32\jscript.dll

2013-02-22 06:14 . 2013-04-11 07:01 729088 ----a-w- c:\windows\system32\msfeeds.dll

2013-02-22 06:13 . 2013-04-11 07:01 2147840 ----a-w- c:\windows\system32\iertutil.dll

2013-02-22 06:13 . 2013-04-11 07:01 96768 ----a-w- c:\windows\system32\mshtmled.dll

2013-02-22 06:12 . 2013-04-11 07:01 2382848 ----a-w- c:\windows\system32\mshtml.tlb

2013-02-22 06:09 . 2013-04-11 07:01 248320 ----a-w- c:\windows\system32\ieui.dll

2013-02-22 03:46 . 2013-04-11 07:01 1800704 ----a-w- c:\windows\SysWow64\jscript9.dll

2013-02-22 03:38 . 2013-04-11 07:01 1129472 ----a-w- c:\windows\SysWow64\wininet.dll

2013-02-22 03:37 . 2013-04-11 07:01 1427968 ----a-w- c:\windows\SysWow64\inetcpl.cpl

2013-02-22 03:34 . 2013-04-11 07:01 142848 ----a-w- c:\windows\SysWow64\ieUnatt.exe

2013-02-22 03:34 . 2013-04-11 07:01 420864 ----a-w- c:\windows\SysWow64\vbscript.dll

2013-02-22 03:31 . 2013-04-11 07:01 2382848 ----a-w- c:\windows\SysWow64\mshtml.tlb

2013-02-15 06:08 . 2013-04-10 13:34 44032 ----a-w- c:\windows\system32\tsgqec.dll

2013-02-15 06:06 . 2013-04-10 13:34 3717632 ----a-w- c:\windows\system32\mstscax.dll

2013-02-15 06:02 . 2013-04-10 13:34 158720 ----a-w- c:\windows\system32\aaclient.dll

2013-02-15 04:37 . 2013-04-10 13:34 3217408 ----a-w- c:\windows\SysWow64\mstscax.dll

2013-02-15 04:34 . 2013-04-10 13:34 131584 ----a-w- c:\windows\SysWow64\aaclient.dll

2013-02-15 03:25 . 2013-04-10 13:34 36864 ----a-w- c:\windows\SysWow64\tsgqec.dll

.

.

((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))

.

.

*Note* empty entries & legit default entries are not shown

REGEDIT4

.

[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"Steam"="c:\program files (x86)\Steam\steam.exe" [2013-05-03 1635752]

"Spotify Web Helper"="c:\users\Ryan\AppData\Roaming\Spotify\Data\SpotifyWebHelper.exe" [2013-05-03 1105408]

"Spotify"="c:\users\Ryan\AppData\Roaming\Spotify\Spotify.exe" [2013-05-03 4573184]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run]

"StartCCC"="c:\program files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" [2011-09-08 343168]

"HP Software Update"="c:\program files (x86)\HP\HP Software Update\HPWuSchd2.exe" [2011-05-10 49208]

"Norton Online Backup"="c:\program files (x86)\Symantec\Norton Online Backup\NOBuClient.exe" [2010-06-01 1155928]

"PDF Complete"="c:\program files (x86)\PDF Complete\pdfsty.exe" [2011-08-12 658424]

"APSDaemon"="c:\program files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2012-11-28 59280]

"iTunesHelper"="c:\program files (x86)\iTunes\iTunesHelper.exe" [2012-12-12 152544]

"SunJavaUpdateSched"="c:\program files (x86)\Common Files\Java\Java Update\jusched.exe" [2012-07-03 252848]

"DivXUpdate"="c:\program files (x86)\DivX\DivX Update\DivXUpdate.exe" [2013-02-13 1263952]

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce]

"Z1"="c:\users\Ryan\Desktop\Virus Solutions\mbar\mbar.exe" [2013-03-23 1398856]

.

c:\programdata\Microsoft\Windows\Start Menu\Programs\Startup\

Bluetooth.lnk - c:\program files\WIDCOMM\Bluetooth Software\BTTray.exe [2011-3-25 1137952]

.

[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]

"ConsentPromptBehaviorAdmin"= 5 (0x5)

"ConsentPromptBehaviorUser"= 3 (0x3)

"EnableUIADesktopToggle"= 0 (0x0)

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\windows nt\currentversion\windows]

"LoadAppInit_DLLs"=1 (0x1)

"AppInit_DLLs"=c:\progra~3\browse~1\261249~1.132\{c16c1~1\browse~1.dll c:\progra~3\browse~1\261249~1.132\{c16c1~1\browserprotect.dll

.

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]

@="Service"

.

R2 clr_optimization_v4.0.30319_64;Microsoft .NET Framework NGEN v4.0.30319_X64;c:\windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe [2010-03-18 138576]

R2 SkypeUpdate;Skype Updater;c:\program files (x86)\Skype\Updater\Updater.exe [2013-02-28 161384]

R3 GamesAppService;GamesAppService;c:\program files (x86)\WildTangent Games\App\GamesAppService.exe [2010-10-12 206072]

R3 NisDrv;Microsoft Network Inspection System;c:\windows\system32\DRIVERS\NisDrvWFP.sys [2013-01-20 130008]

R3 NisSrv;NisSrv;c:\program files\Microsoft Security Client\NisSrv.exe [2013-01-27 379360]

R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-21 59392]

R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-21 31232]

R3 USBAAPL64;Apple Mobile USB Driver;c:\windows\system32\Drivers\usbaapl64.sys [2012-09-28 53760]

R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [2012-06-02 1255736]

R4 wlcrasvc;Windows Live Mesh remote connections service;c:\program files\Windows Live\Mesh\wlcrasvc.exe [2010-09-23 57184]

S0 amd_sata;amd_sata;c:\windows\system32\drivers\amd_sata.sys [2011-08-03 78976]

S0 amd_xata;amd_xata;c:\windows\system32\drivers\amd_xata.sys [2011-08-03 38528]

S2 AMD External Events Utility;AMD External Events Utility;c:\windows\system32\atiesrxx.exe [2011-09-26 204288]

S2 BrowserProtect;BrowserProtect;c:\programdata\BrowserProtect\2.6.1249.132\{c16c1ccb-7046-4e5c-a2f3-533ad2fec8e8}\BrowserProtect.exe [2013-03-22 2787280]

S2 CalendarSynchService;CalendarSynchService;c:\program files (x86)\Hewlett-Packard\TouchSmart\Calendar\Service\GCalService.exe [2011-08-16 16384]

S2 cvhsvc;Client Virtualization Handler;c:\program files (x86)\Common Files\Microsoft Shared\Virtualization Handler\CVHSVC.EXE [2012-01-04 822624]

S2 HP Support Assistant Service;HP Support Assistant Service;c:\program files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe [2012-09-27 86528]

S2 HPClientSvc;HP Client Services;c:\program files\Hewlett-Packard\HP Client Services\HPClientServices.exe [2010-10-11 346168]

S2 NIS;Norton Internet Security;c:\program files (x86)\Norton Internet Security\Engine\19.1.0.28\ccSvcHst.exe [2011-08-10 138760]

S2 NOBU;Norton Online Backup;c:\program files (x86)\Symantec\Norton Online Backup\NOBuAgent.exe SERVICE [x]

S2 pdfcDispatcher;PDF Document Manager;c:\program files (x86)\PDF Complete\pdfsvc.exe [2011-08-12 1128952]

S2 sftlist;Application Virtualization Client;c:\program files (x86)\Microsoft Application Virtualization Client\sftlist.exe [2011-10-01 508776]

S3 BHDrvx64;BHDrvx64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_19.1.0.28\Definitions\BASHDefs\20120711.001\BHDrvx64.sys [2012-06-19 1161376]

S3 BTWAMPFL;BTWAMPFL;c:\windows\system32\DRIVERS\btwampfl.sys [2011-03-26 349736]

S3 btwl2cap;Bluetooth L2CAP Service;c:\windows\system32\DRIVERS\btwl2cap.sys [2011-03-26 39464]

S3 ccSet_NIS;Norton Internet Security Settings Manager;c:\windows\system32\drivers\NISx64\1301000.01C\ccSetx64.sys [2011-08-08 167048]

S3 EraserUtilRebootDrv;EraserUtilRebootDrv;c:\program files (x86)\Common Files\Symantec Shared\EENGINE\EraserUtilRebootDrv.sys [2012-06-01 138912]

S3 IDSVia64;IDSVia64;c:\programdata\Norton\{0C55C096-0F1D-4F28-AAA2-85EF591126E7}\NIS_19.1.0.28\Definitions\IPSDefs\20120711.001\IDSvia64.sys [2012-06-18 509088]

S3 RTL8167;Realtek 8167 NT Driver;c:\windows\system32\DRIVERS\Rt64win7.sys [2011-09-14 533096]

S3 SaiK0CD7;SaiK0CD7;c:\windows\system32\DRIVERS\SaiK0CD7.sys [2012-09-20 180544]

S3 SaiU0CD7;SaiU0CD7;c:\windows\system32\DRIVERS\SaiU0CD7.sys [2012-09-20 47168]

S3 Sftfs;Sftfs;c:\windows\system32\DRIVERS\Sftfslh.sys [2011-10-01 764264]

S3 Sftplay;Sftplay;c:\windows\system32\DRIVERS\Sftplaylh.sys [2011-10-01 268648]

S3 Sftredir;Sftredir;c:\windows\system32\DRIVERS\Sftredirlh.sys [2011-10-01 25960]

S3 Sftvol;Sftvol;c:\windows\system32\DRIVERS\Sftvollh.sys [2011-10-01 22376]

S3 sftvsa;Application Virtualization Service Agent;c:\program files (x86)\Microsoft Application Virtualization Client\sftvsa.exe [2011-10-01 219496]

S3 SymDS;Symantec Data Store;c:\windows\system32\drivers\NISx64\1301000.01C\SYMDS64.SYS [2011-07-25 451192]

S3 SymEFA;Symantec Extended File Attributes;c:\windows\system32\drivers\NISx64\1301000.01C\SYMEFA64.SYS [2011-07-28 1084536]

S3 SymIRON;Symantec Iron Driver;c:\windows\system32\drivers\NISx64\1301000.01C\Ironx64.SYS [2011-07-25 189560]

S3 SymNetS;Symantec Network Security WFP Driver;c:\windows\system32\drivers\NISx64\1301000.01C\SYMNETS.SYS [2011-07-25 401016]

S3 usbfilter;AMD USB Filter Driver;c:\windows\system32\drivers\usbfilter.sys [2011-08-04 47232]

.

.

[HKEY_LOCAL_MACHINE\software\wow6432node\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]

2013-04-12 01:08 1642448 ----a-w- c:\program files (x86)\Google\Chrome\Application\26.0.1410.64\Installer\chrmstp.exe

.

Contents of the 'Scheduled Tasks' folder

.

2013-05-15 c:\windows\Tasks\Adobe Flash Player Updater.job

- c:\windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe [2013-02-23 20:14]

.

2013-05-15 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-02-18 04:40]

.

2013-05-15 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job

- c:\program files (x86)\Google\Update\GoogleUpdate.exe [2013-02-18 04:40]

.

2013-05-11 c:\windows\Tasks\HPCeeScheduleForRyan.job

- c:\program files (x86)\Hewlett-Packard\HP Ceement\HPCEE.exe [2011-07-15 11:43]

.

.

--------- X64 Entries -----------

.

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]

"hpsysdrv"="c:\program files (x86)\hewlett-packard\HP odometer\hpsysdrv.exe" [2008-11-20 62768]

"ProfilerU"="c:\program files\SmartTechnology\Software\ProfilerU.exe" [2013-01-31 454144]

"SaiMfd"="c:\program files\SmartTechnology\Software\SaiMfd.exe" [2013-01-31 158208]

.

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost - LocalService

FontCache

.

------- Supplementary Scan -------

.

uStart Page = https://www.google.com/

uLocal Page = c:\windows\system32\blank.htm

mLocal Page = c:\windows\SysWOW64\blank.htm

uInternet Settings,ProxyOverride = *.local

IE: Send image to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie_ctx.htm

IE: Send page to &Bluetooth Device... - c:\program files\WIDCOMM\Bluetooth Software\btsendto_ie.htm

TCP: DhcpNameServer = 192.168.1.1

.

- - - - ORPHANS REMOVED - - - -

.

Wow6432Node-HKLM-Run-<NO NAME> - (no file)

HKLM_Wow6432Node-ActiveSetup-{F5E7D9AF-60F6-4A30-87E3-4EA94D322CE1} - msiexec

HKLM-Run-MSC - c:\program files\Microsoft Security Client\mssecex.exe

AddRemove-{EE202411-2C26-49E8-9784-1BC1DBF7DE96} - c:\program files (x86)\InstallShield Installation Information\{EE202411-2C26-49E8-9784-1BC1DBF7DE96}\setup.exe

.

.

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\NIS]

"ImagePath"="\"c:\program files (x86)\Norton Internet Security\Engine\19.1.0.28\ccSvcHst.exe\" /s \"NIS\" /m \"c:\program files (x86)\Norton Internet Security\Engine\19.1.0.28\diMaster.dll\" /prefetch:1"

--

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\pdfcDispatcher]

"ImagePath"="c:\program files (x86)\PDF Complete\pdfsvc.exe /startedbyscm:66B66708-40E2BE4D-pdfcService"

.

--------------------- LOCKED REGISTRY KEYS ---------------------

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_7_700_202_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil64_11_7_700_202_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="FlashBroker"

"LocalizedString"="@c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_7_700_202_ActiveX.exe,-101"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]

"Enabled"=dword:00000001

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\FlashUtil32_11_7_700_202_ActiveX.exe"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Shockwave Flash Object"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_202.ocx"

"ThreadingModel"="Apartment"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\MiscStatus]

@="0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ProgID]

@="ShockwaveFlash.ShockwaveFlash.11"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_202.ocx, 1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB6E-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="ShockwaveFlash.ShockwaveFlash"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}]

@Denied: (A 2) (Everyone)

@="Macromedia Flash Factory Object"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\InprocServer32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_202.ocx"

"ThreadingModel"="Apartment"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ProgID]

@="FlashFactory.FlashFactory.1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\ToolboxBitmap32]

@="c:\\Windows\\SysWOW64\\Macromed\\Flash\\Flash32_11_7_700_202.ocx, 1"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\TypeLib]

@="{D27CDB6B-AE6D-11cf-96B8-444553540000}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\Version]

@="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D27CDB70-AE6D-11cf-96B8-444553540000}\VersionIndependentProgID]

@="FlashFactory.FlashFactory"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]

@Denied: (A 2) (Everyone)

@="IFlashBroker5"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]

@="{00020424-0000-0000-C000-000000000046}"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]

@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"

"Version"="1.0"

.

[HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Nico Mak Computing\WinZip]

"SymbolicLinkValue"=hex(6):5c,00,52,00,65,00,67,00,69,00,73,00,74,00,72,00,79,

00,5c,00,4d,00,41,00,43,00,48,00,49,00,4e,00,45,00,5c,00,53,00,6f,00,66,00,\

.

[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]

@Denied: (Full) (Everyone)

.

Completion time: 2013-05-15 17:40:49

ComboFix-quarantined-files.txt 2013-05-15 21:40

.

Pre-Run: 878,556,389,376 bytes free

Post-Run: 882,432,520,192 bytes free

.

- - End Of File - - 9342BFC08A5A1714A946D6BFFFD9EA69

Link to post
Share on other sites

Looks Good...........

Lets check for any adware while you're here:

Please download AdwCleaner from here and save it on your Desktop.

AdwCleaner is a reliable removal tool for Adware, Foistware, toolbars and potentially unwanted programs.

AdwCleaner is a tool that deletes :

· Adwares (software ads)

· PUP/LPI (Potentially Undesirable Program)

· Toolbars

· Hijacker (Hijack of the browser's homepage)

It works with a Search and Deletion method. It can be easily uninstalled using the "Uninstall" mode.

  1. Right-click on adwcleaner.exe and select Run As Administrator (for XP just double click) to launch the application.
  2. Now click on the Search tab.
  3. Please post the contents of the log-file created in your next post.

Note: The log can also be located at C:\ >> AdwCleaner[XX].txt >> XX <-- Denotes the number of times the application has been ran, so in this should be something like R1.

Note:

Please look over what was found......especially any folders, we're going to permanently delete it all in the next step....if there's something you may want to keep...please let me know and I'll explain to why it shouldn't be on your system.

If you see AVG Secure Search being targeted for deletion, Here's Why and Here. You can always Reinstall it.

Please note that Antivir Webguard uses ASK Toolbar as part of its web security. If you remove ASK by using Adwcleaner, Antivir Webguard will no longer work properly. Therefore, if you use this program please use the instructions below to access the options screen where you should enable /DisableAskDetections before using AdwCleaner.

You can click on the question mark (?) in the upper left corner of the program and then click on Options. You will then be presented with a dialog where you can disable various detections. These options are described below:

/DisableAskDetection - This option disables Ask Toolbar detection.

MrC

Link to post
Share on other sites

# AdwCleaner v2.300 - Logfile created 05/15/2013 at 18:16:09

# Updated 28/04/2013 by Xplode

# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)

# User : Ryan - RYAN-HP

# Boot Mode : Normal

# Running from : C:\Users\Ryan\Downloads\adwcleaner.exe

# Option [search]

***** [services] *****

Found : BrowserProtect

***** [Files / Folders] *****

File Found : C:\Users\Ryan\AppData\Local\Google\Chrome\User Data\Default\bProtector Web Data

File Found : C:\Users\Ryan\AppData\Local\Google\Chrome\User Data\Default\bprotectorpreferences

Folder Found : C:\ProgramData\Babylon

Folder Found : C:\ProgramData\BrowserProtect

Folder Found : C:\Users\Ryan\AppData\LocalLow\boost_interprocess

Folder Found : C:\Users\Ryan\AppData\Roaming\Babylon

Folder Found : C:\Users\Ryan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\BrowserProtect

***** [Registry] *****

Data Found : HKLM\..\Windows [AppInit_DLLs] = c:\progra~3\browse~1\261249~1.132\{c16c1~1\browse~1.dll

Data Found : HKLM\..\Windows [AppInit_DLLs] = c:\progra~3\browse~1\261249~1.132\{c16c1~1\browserprotect.dll

Key Found : HKCU\Software\DataMngr_Toolbar

Key Found : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\bProtectSettings

Key Found : HKCU\Software\5d6ddd1e53aeb12

Key Found : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Found : HKLM\Software\Babylon

Key Found : HKLM\SOFTWARE\Classes\Prod.cap

Key Found : HKLM\Software\DataMngr

Key Found : HKLM\SOFTWARE\Wow6432Node\5d6ddd1e53aeb12

Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Found : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{15D2D75C-9CB2-4EFD-BAD7-B9B4CB4BC693}

Key Found : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Found : HKU\S-1-5-21-843207835-2334595079-461602815-1000\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16476

[OK] Registry is clean.

-\\ Google Chrome v26.0.1410.64

File : C:\Users\Ryan\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[R1].txt - [2333 octets] - [15/05/2013 18:16:09]

########## EOF - C:\AdwCleaner[R1].txt - [2393 octets] ##########

Link to post
Share on other sites

Some adware found....lets clear it out.....

  1. Please re-run AdwCleaner
  2. Click on Delete button.
  3. Confirm each time with OK if asked.
  4. Your computer will be rebooted automatically. A text file will open after the restart. Please post the content of that logfile in your reply.

Note: You can find the logfile at C:\AdwCleaner[sn].txt as well - n is the order number.

Then......

Lets check your computers security before you go and we have a little cleanup to do also:

Download Security Check by screen317 from HERE or HERE.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • A Notepad document should open automatically called checkup.txt.
  • Please Post the contents of that document.
  • Do Not Attach It!!!

MrC

Link to post
Share on other sites

# AdwCleaner v2.300 - Logfile created 05/15/2013 at 19:37:21

# Updated 28/04/2013 by Xplode

# Operating system : Windows 7 Home Premium Service Pack 1 (64 bits)

# User : Ryan - RYAN-HP

# Boot Mode : Normal

# Running from : C:\Users\Ryan\Desktop\Virus Solutions\adwcleaner.exe

# Option [Delete]

***** [services] *****

Stopped & Deleted : BrowserProtect

***** [Files / Folders] *****

Deleted on reboot : C:\ProgramData\BrowserProtect

File Deleted : C:\Users\Ryan\AppData\Local\Google\Chrome\User Data\Default\bProtector Web Data

File Deleted : C:\Users\Ryan\AppData\Local\Google\Chrome\User Data\Default\bprotectorpreferences

Folder Deleted : C:\ProgramData\Babylon

Folder Deleted : C:\Users\Ryan\AppData\LocalLow\boost_interprocess

Folder Deleted : C:\Users\Ryan\AppData\Roaming\Babylon

Folder Deleted : C:\Users\Ryan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\BrowserProtect

***** [Registry] *****

Data Deleted : HKLM\..\Windows [AppInit_DLLs] = c:\progra~3\browse~1\261249~1.132\{c16c1~1\browse~1.dll

Data Deleted : HKLM\..\Windows [AppInit_DLLs] = c:\progra~3\browse~1\261249~1.132\{c16c1~1\browserprotect.dll

Key Deleted : HKCU\Software\DataMngr_Toolbar

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\bProtectSettings

Key Deleted : HKCU\Software\5d6ddd1e53aeb12

Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Deleted : HKLM\Software\Babylon

Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap

Key Deleted : HKLM\Software\DataMngr

Key Deleted : HKLM\SOFTWARE\Wow6432Node\5d6ddd1e53aeb12

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

Key Deleted : HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{15D2D75C-9CB2-4EFD-BAD7-B9B4CB4BC693}

Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{2FA28606-DE77-4029-AF96-B231E3B8F827}

***** [internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16476

[OK] Registry is clean.

-\\ Google Chrome v26.0.1410.64

File : C:\Users\Ryan\AppData\Local\Google\Chrome\User Data\Default\Preferences

[OK] File is clean.

*************************

AdwCleaner[s1].txt - [2251 octets] - [15/05/2013 19:37:21]

########## EOF - C:\AdwCleaner[s1].txt - [2311 octets] ##########

Link to post
Share on other sites

Security Check Log:

Results of screen317's Security Check version 0.99.63

Windows 7 Service Pack 1 x64 (UAC is enabled)

Internet Explorer 9

``````````````Antivirus/Firewall Check:``````````````

Windows Firewall Enabled!

Norton Internet Security

WMI entry may not exist for antivirus; attempting automatic update.

`````````Anti-malware/Other Utilities Check:`````````

Java 7 Update 17

Java version out of Date!

Adobe Flash Player 11.7.700.202

Google Chrome 26.0.1410.43

Google Chrome 26.0.1410.64

````````Process Check: objlist.exe by Laurent````````

Norton ccSvcHst.exe

Symantec Norton Online Backup NOBuAgent.exe

`````````````````System Health check`````````````````

Total Fragmentation on Drive C: 0%

````````````````````End of Log``````````````````````

Link to post
Share on other sites

Out dated programs on the system are vulnerable to malware.

Please update or uninstall them:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Java 7 Update 17 <---please update, should be Update 21

Java version out of Date! <--------Go to control panel > Java > Update Tab > Update Now

Uncheck the box to install the Ask toolbar!!! and any other free "stuff".

If there's no update tab in Java, uninstall it and Download and install the latest version from Here

Uncheck the box to install the Ask toolbar!!! and any other free "stuff".

-------------------------------------------------------------------

Google Chrome 26.0.1410.43 <-----OLD

Google Chrome 26.0.1410.64 <-----OK

You have old versions of Google Chrome on the system.

Please download and run OldChromeRemover.

@Windows Vista/Windows 7-8 users must use “Run As Administrator.”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A little clean up to do....

Please Uninstall ComboFix: (if you used it)

Press the Windows logo key + R to bring up the "run box"

Copy and paste next command in the field:

ComboFix /uninstall

Make sure there's a space between Combofix and /

cf2.jpg

Then hit enter.

This will uninstall Combofix, delete its related folders and files, hide file extensions, hide the system/hidden files and clears System Restore cache and create new Restore point

(If that doesn't work.....you can simply rename ComboFix.exe to Uninstall.exe and double click it to complete the uninstall)

---------------------------------

If you used DeFogger to disable your CD Emulation drivers, please re-enable them.

-------------------------------

Please download OTC to your desktop.

http://oldtimer.geekstogo.com/OTC.exe

Double-click OTC to run it. (Vista and up users, please right click on OTC and select "Run as an Administrator")

Click on the CleanUp! button and follow the prompts.

(If you get a warning from your firewall or other security programs regarding OTC attempting to contact the Internet, please allow the connection.)

You will be asked to reboot the machine to finish the Cleanup process, choose Yes.

After the reboot all the tools we used should be gone.

Note: Some more recently created tools may not yet be removed by OTC. Feel free to manually delete any tools it leaves behind.

Any other programs or logs you can manually delete.

IE: RogueKiller.exe, RKreport.txt, RK_Quarantine folder, C:\FRST, MBAR, etc....AdwCleaner > just run the program and click uninstall.

-------------------------------

Any questions...please post back.

If you think I've helped you, please leave a comment > click on my avatar picture > click Profile Feed.

Take a look at My Preventive Maintenance to avoid being infected again.

Good Luck and Thanks for using the forum, MrC

Link to post
Share on other sites

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.