Jump to content

FBI Green Dot Infection Safe Mode Disabled


Recommended Posts

Hi,

 

I have it pretty bad.  The desktop is instantly hijacked upon startup.  I tried to boot in safe mode with command prompt but the command prompt disappears upon startup leaving me with a black screen that reads "safe mode" in all four corners. I have read the rules and understand you can't help if I have p2p software installed. I will gladly delete but cant figure out how to do this with the computer in its current state.  Please Help!

Link to post
Share on other sites

Welcome to the forum, here's how we deal with that malware:

  • Please download Farbar Recovery Scan Tool and save it to a flash drive.

    Please make sure you click download buttons that look like this, not "sponsored ad links":

    bleep-crop.jpg

    Note: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

    Plug the flash drive into the infected PC.

  • If you are using Windows 8 consult How to use the Windows 8 System Recovery Environment Command Prompt to enter System Recovery Command prompt.

    If you are using Vista or Windows 7 enter System Recovery Options.

    To enter System Recovery Options from the Advanced Boot Options:

    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    Note: In case you can not enter System Recovery Options by using F8 method, you can use Windows installation disc, or make a repair disc. Any Windows installation disc or a repair disc made on another computer can be used.

    To make a repair disk on Windows 7 consult: http://www.sevenforums.com/tutorials/2083-system-repair-disc-create.html

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Select US as the keyboard language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.
  • On the System Recovery Options menu you will get the following options:
      • Startup Repair

        System Restore

        Windows Complete PC Restore

        Windows Memory Diagnostic Tool

        Command Prompt

        Select Command Prompt

        Once in the Command Prompt:

    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst (for x64 bit version type e:\frst64) and press Enter

      Note: Replace letter e with the drive letter of your flash drive.

    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please copy and paste it to your reply.
MrC
Link to post
Share on other sites

Ok, the txt is as follows:

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 14-11-2013
Ran by SYSTEM on MININT-9GI0PRA on 14-11-2013 16:08:35
Running from H:\
Windows 7 Home Premium (X64) OS Language: English(US)
Internet Explorer Version 10
Boot Mode: Recovery

The current controlset is ControlSet001
ATTENTION!:=====> If the system is bootable FRST could be run from normal or Safe mode to create a complete log.

==================== Registry (Whitelisted) ==================

HKLM\...\Run: [synTPEnh] - C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1815848 2009-07-14] (Synaptics Incorporated)
HKLM\...\Run: [smartMenu] - C:\Program Files\Hewlett-Packard\HP MediaSmart\SmartMenu.exe [610872 2009-07-21] ()
HKLM\...\Run: [intelTBRunOnce] - C:\Program Files\Intel\TurboBoost\RunTBGadgetOnce.vbs [4526 2010-11-29] ()
HKLM\...\Run: [NvCplDaemon] - RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
HKLM\...\Run: [sysTrayApp] - C:\Program Files\IDT\WDM\sttray64.exe [450048 2009-07-21] (IDT, Inc.)
HKLM\...\Run: [Logitech Download Assistant] - C:\Windows\system32\rundll32.exe C:\Windows\System32\LogiLDA.dll,LogiFetch
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox] C:\$Recycle.Bin\S-1-5-18\$b1358a064e886873e9128ff4ec2ea2cf\n. ATTENTION! ====> ZeroAccess?
HKLM-x32\...\Run: [GrooveMonitor] - C:\Program Files (x86)\Microsoft Office\Office12\GrooveMonitor.exe [30040 2009-02-26] (Microsoft Corporation)
HKLM-x32\...\Run: [AVG_UI] - C:\Program Files (x86)\AVG\AVG2014\avgui.exe [4908592 2013-10-07] (AVG Technologies CZ, s.r.o.)
HKLM-x32\...\Run: [vProt] - C:\Program Files (x86)\AVG Secure Search\vprot.exe [2420248 2013-11-10] ()
HKLM-x32\...\Run: [Adobe ARM] - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [958576 2013-04-04] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [QuickTime Task] - C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2013-05-01] (Apple Inc.)
HKLM-x32\...\Run: [APSDaemon] - C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [59720 2013-04-21] (Apple Inc.)
HKU\Default\...\Run: [HPADVISOR] - C:\Program Files (x86)\Hewlett-Packard\HP Advisor\HPAdvisor.exe [1668664 2009-07-15] (Hewlett-Packard)
HKU\Default\...\Policies\system: [WallpaperStyle] 2
HKU\Default User\...\Run: [HPADVISOR] - C:\Program Files (x86)\Hewlett-Packard\HP Advisor\HPAdvisor.exe [1668664 2009-07-15] (Hewlett-Packard)
HKU\Default User\...\Policies\system: [WallpaperStyle] 2
HKU\Mike\...\Run: [backgroundContainer] - "C:\Windows\SysWOW64\Rundll32.exe" "C:\Users\Mike\AppData\Local\Conduit\BackgroundContainer\BackgroundContainer.dll",DllRun <===== ATTENTION
HKU\Mike\...\Run: [b7zJDGxY5.exe] - C:\Users\Mike\AppData\Local\V8Upszhg7Z\B7zJDGxY5.exe [160464 2013-11-13] (Microsoft Corporation)
HKU\Mike\...\Policies\system: [WallpaperStyle] 2
HKU\Mike\...\CurrentVersion\Windows: [Load] C:\Users\Mike\LOCALS~1\Temp\msyaoac.bat <===== ATTENTION
HKU\Mike\...\Winlogon: [shell] cmd.exe [345088 2010-11-20] (Microsoft Corporation) <==== ATTENTION
HKU\Mike\...\Command Processor: "C:\Users\Mike\AppData\Local\V8Upszhg7Z\B7zJDGxY5.exe" <===== ATTENTION!
HKU\UpdatusUser\...\Run: [HPADVISOR] - C:\Program Files (x86)\Hewlett-Packard\HP Advisor\HPAdvisor.exe [1668664 2009-07-15] (Hewlett-Packard)
HKU\UpdatusUser\...\Policies\system: [WallpaperStyle] 2
AppInit_DLLs:        [0 ] ()
Startup: C:\Users\Mike\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Intel® Turbo Boost Technology Monitor 2.0.lnk
ShortcutTarget: Intel® Turbo Boost Technology Monitor 2.0.lnk -> C:\Program Files\Intel\TurboBoost\SignalIslandUi.exe (Intel® Corporation)

==================== Services (Whitelisted) =================

S2 AESTFilters; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_ccf0dd3cb081af84\AESTSr64.exe [89600 2009-03-02] (Andrea Electronics Corporation)
S2 AVGIDSAgent; C:\Program Files (x86)\AVG\AVG2014\avgidsagent.exe [3538480 2013-10-03] (AVG Technologies CZ, s.r.o.)
S2 avgwd; C:\Program Files (x86)\AVG\AVG2014\avgwdsvc.exe [301152 2013-09-25] (AVG Technologies CZ, s.r.o.)
S2 FreeWordHelper; C:\Program Files (x86)\FreeWordHelper\FreeWordHelperUpdt.exe [1778176 2011-12-15] ()
S2 MBAMScheduler; C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
S2 MBAMService; C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
S2 PCDocPDFUpdt; C:\Program Files (x86)\PCHealthDocPDFReader\PCDocPDFUpdt.exe [686592 2012-03-05] ()
S2 STacSV; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_ccf0dd3cb081af84\STacSV64.exe [240128 2009-07-21] (IDT, Inc.)
S2 UtilityChest_49Service; C:\PROGRA~2\UTILIT~2\bar\1.bin\49barsvc.exe [42504 2013-07-07] (COMPANYVERS_NAME)
S2 vToolbarUpdater17.1.2; C:\Program Files (x86)\Common Files\AVG Secure Search\vToolbarUpdater\17.1.2\ToolbarUpdater.exe [1734680 2013-11-10] (AVG Secure Search)
S2 HP Support Assistant Service; "C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe" [x]

==================== Drivers (Whitelisted) ====================

S1 Avgdiska; C:\Windows\System32\DRIVERS\avgdiska.sys [148792 2013-09-25] (AVG Technologies CZ, s.r.o.)
S1 AVGIDSDriver; C:\Windows\System32\DRIVERS\avgidsdrivera.sys [241464 2013-09-02] (AVG Technologies CZ, s.r.o.)
S0 AVGIDSHA; C:\Windows\System32\DRIVERS\avgidsha.sys [192824 2013-09-02] (AVG Technologies CZ, s.r.o.)
S1 Avgldx64; C:\Windows\System32\DRIVERS\avgldx64.sys [212280 2013-09-02] (AVG Technologies CZ, s.r.o.)
S0 Avgloga; C:\Windows\System32\DRIVERS\avgloga.sys [294712 2013-09-02] (AVG Technologies CZ, s.r.o.)
S0 Avgmfx64; C:\Windows\System32\DRIVERS\avgmfx64.sys [123704 2013-08-20] (AVG Technologies CZ, s.r.o.)
S0 Avgrkx64; C:\Windows\System32\DRIVERS\avgrkx64.sys [31544 2013-09-08] (AVG Technologies CZ, s.r.o.)
S1 Avgtdia; C:\Windows\System32\DRIVERS\avgtdia.sys [251192 2013-08-01] (AVG Technologies CZ, s.r.o.)
S1 avgtp; C:\Windows\system32\drivers\avgtpx64.sys [46368 2013-11-10] (AVG Technologies)
S3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [25928 2013-04-04] (Malwarebytes Corporation)

==================== NetSvcs (Whitelisted) ===================

==================== One Month Created Files and Folders ========

2013-11-14 16:08 - 2013-11-14 16:08 - 00000000 ____D C:\FRST
2013-11-14 04:28 - 2013-11-14 04:28 - 00299520 _____ C:\Users\Mike\AppData\Roaming\rqHOcIA87ht
2013-11-14 04:28 - 2013-11-14 04:28 - 00299520 _____ C:\Users\Mike\AppData\Local\uKnr5HzogvQ
2013-11-14 04:28 - 2013-11-14 04:28 - 00299520 _____ C:\ProgramData\AqhdHATJd20
2013-11-13 13:59 - 2013-11-13 13:59 - 00300544 _____ C:\Users\Mike\AppData\Roaming\ixcBIbth
2013-11-13 13:59 - 2013-11-13 13:59 - 00300544 _____ C:\Users\Mike\AppData\Local\d97qL0Lkj
2013-11-13 13:59 - 2013-11-13 13:59 - 00300544 _____ C:\ProgramData\tEoiqf5H
2013-11-13 13:50 - 2013-11-13 13:50 - 00299520 _____ C:\Users\Mike\AppData\Roaming\2iTwdZnX
2013-11-13 13:50 - 2013-11-13 13:50 - 00299520 _____ C:\Users\Mike\AppData\Local\fWYZhgY3Y
2013-11-13 13:50 - 2013-11-13 13:50 - 00299520 _____ C:\ProgramData\ooZlO7udDo6
2013-11-13 13:41 - 2013-11-13 13:43 - 00000000 ____D C:\Users\Mike\AppData\Local\V8Upszhg7Z
2013-11-13 13:41 - 2013-11-13 13:41 - 00299520 _____ C:\Users\Mike\AppData\Roaming\1cJ2AnS4C4
2013-11-13 13:41 - 2013-11-13 13:41 - 00299520 _____ C:\Users\Mike\AppData\Local\QuicxYMZ
2013-11-13 13:41 - 2013-11-13 13:41 - 00299520 _____ C:\ProgramData\3wDL9YWthy
2013-11-13 01:02 - 2013-10-12 00:45 - 00051712 _____ (Microsoft Corporation) C:\Windows\System32\ie4uinit.exe
2013-11-13 01:02 - 2013-10-12 00:43 - 03959808 _____ (Microsoft Corporation) C:\Windows\System32\jscript9.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 02648576 _____ (Microsoft Corporation) C:\Windows\System32\iertutil.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00855552 _____ (Microsoft Corporation) C:\Windows\System32\jscript.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00603136 _____ (Microsoft Corporation) C:\Windows\System32\msfeeds.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00526336 _____ (Microsoft Corporation) C:\Windows\System32\ieui.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00136704 _____ (Microsoft Corporation) C:\Windows\System32\iesysprep.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00067072 _____ (Microsoft Corporation) C:\Windows\System32\iesetup.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00039936 _____ (Microsoft Corporation) C:\Windows\System32\iernonce.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 02877952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 02049024 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00690688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00493056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00391168 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00109056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesysprep.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00061440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00033280 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2013-11-13 01:02 - 2013-10-11 22:35 - 02706432 _____ (Microsoft Corporation) C:\Windows\System32\mshtml.tlb
2013-11-13 01:02 - 2013-10-11 22:08 - 02706432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2013-11-13 01:02 - 2013-10-11 21:44 - 00089600 _____ (Microsoft Corporation) C:\Windows\System32\RegisterIEPKEYs.exe
2013-11-13 01:02 - 2013-10-11 21:15 - 00071680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\RegisterIEPKEYs.exe
2013-11-13 01:01 - 2013-10-12 00:45 - 02241536 _____ (Microsoft Corporation) C:\Windows\System32\wininet.dll
2013-11-13 01:01 - 2013-10-12 00:45 - 01364992 _____ (Microsoft Corporation) C:\Windows\System32\urlmon.dll
2013-11-13 01:01 - 2013-10-12 00:43 - 19269632 _____ (Microsoft Corporation) C:\Windows\System32\mshtml.dll
2013-11-13 01:01 - 2013-10-12 00:43 - 15404544 _____ (Microsoft Corporation) C:\Windows\System32\ieframe.dll
2013-11-13 01:01 - 2013-10-12 00:43 - 00053248 _____ (Microsoft Corporation) C:\Windows\System32\jsproxy.dll
2013-11-13 01:01 - 2013-10-11 23:03 - 01767936 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2013-11-13 01:01 - 2013-10-11 23:03 - 01138176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2013-11-13 01:01 - 2013-10-11 23:02 - 14355968 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2013-11-13 01:01 - 2013-10-11 23:02 - 13761024 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2013-11-13 01:01 - 2013-10-11 23:02 - 00039424 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2013-11-12 23:53 - 2013-10-11 18:30 - 00830464 _____ (Microsoft Corporation) C:\Windows\System32\nshwfp.dll
2013-11-12 23:53 - 2013-10-11 18:29 - 00859648 _____ (Microsoft Corporation) C:\Windows\System32\IKEEXT.DLL
2013-11-12 23:53 - 2013-10-11 18:29 - 00324096 _____ (Microsoft Corporation) C:\Windows\System32\FWPUCLNT.DLL
2013-11-12 23:53 - 2013-10-11 18:03 - 00656896 _____ (Microsoft Corporation) C:\Windows\SysWOW64\nshwfp.dll
2013-11-12 23:53 - 2013-10-11 18:01 - 00216576 _____ (Microsoft Corporation) C:\Windows\SysWOW64\FWPUCLNT.DLL
2013-11-12 23:53 - 2013-10-05 12:25 - 01474048 _____ (Microsoft Corporation) C:\Windows\System32\crypt32.dll
2013-11-12 23:53 - 2013-10-05 11:57 - 01168384 _____ (Microsoft Corporation) C:\Windows\SysWOW64\crypt32.dll
2013-11-12 23:53 - 2013-10-03 18:28 - 00190464 _____ (Microsoft Corporation) C:\Windows\System32\SmartcardCredentialProvider.dll
2013-11-12 23:53 - 2013-10-03 18:25 - 00197120 _____ (Microsoft Corporation) C:\Windows\System32\credui.dll
2013-11-12 23:53 - 2013-10-03 18:24 - 01930752 _____ (Microsoft Corporation) C:\Windows\System32\authui.dll
2013-11-12 23:53 - 2013-10-03 17:58 - 00152576 _____ (Microsoft Corporation) C:\Windows\SysWOW64\SmartcardCredentialProvider.dll
2013-11-12 23:53 - 2013-10-03 17:56 - 01796096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\authui.dll
2013-11-12 23:53 - 2013-10-03 17:56 - 00168960 _____ (Microsoft Corporation) C:\Windows\SysWOW64\credui.dll
2013-11-12 23:53 - 2013-10-02 18:23 - 00404480 _____ (Microsoft Corporation) C:\Windows\System32\gdi32.dll
2013-11-12 23:53 - 2013-10-02 18:00 - 00311808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\gdi32.dll
2013-11-12 23:53 - 2013-09-27 17:09 - 00497152 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\afd.sys
2013-11-12 23:53 - 2013-09-24 18:26 - 00154560 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\ksecpkg.sys
2013-11-12 23:53 - 2013-09-24 18:26 - 00095680 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\ksecdd.sys
2013-11-12 23:53 - 2013-09-24 18:23 - 00135680 _____ (Microsoft Corporation) C:\Windows\System32\sspicli.dll
2013-11-12 23:53 - 2013-09-24 18:23 - 00028672 _____ (Microsoft Corporation) C:\Windows\System32\sspisrv.dll
2013-11-12 23:53 - 2013-09-24 18:23 - 00028160 _____ (Microsoft Corporation) C:\Windows\System32\secur32.dll
2013-11-12 23:53 - 2013-09-24 18:22 - 00340992 _____ (Microsoft Corporation) C:\Windows\System32\schannel.dll
2013-11-12 23:53 - 2013-09-24 18:21 - 01447936 _____ (Microsoft Corporation) C:\Windows\System32\lsasrv.dll
2013-11-12 23:53 - 2013-09-24 18:21 - 00307200 _____ (Microsoft Corporation) C:\Windows\System32\ncrypt.dll
2013-11-12 23:53 - 2013-09-24 17:58 - 00096768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\sspicli.dll
2013-11-12 23:53 - 2013-09-24 17:57 - 00247808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\schannel.dll
2013-11-12 23:53 - 2013-09-24 17:57 - 00022016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\secur32.dll
2013-11-12 23:53 - 2013-09-24 17:56 - 00220160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ncrypt.dll
2013-11-12 23:53 - 2013-09-24 17:03 - 00030720 _____ (Microsoft Corporation) C:\Windows\System32\lsass.exe
2013-11-12 23:53 - 2013-07-04 04:18 - 00458712 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\cng.sys
2013-11-11 08:22 - 2013-11-11 08:22 - 01063424 ____T C:\ProgramData\gi7elffr.fdd
2013-11-11 08:21 - 2013-11-11 08:22 - 95025368 ____T C:\ProgramData\gi7elffr.bxx
2013-11-11 08:21 - 2013-11-11 08:21 - 00211456 _____ (Sato Corporation) C:\ProgramData\rffle7ig.dss
2013-11-11 08:21 - 2013-11-11 08:21 - 00061536 ____T (Microsoft Corporation) C:\ProgramData\gi7elffr.pss
2013-11-11 08:21 - 2013-11-11 08:21 - 00000000 _____ C:\ProgramData\gi7elffr.fvv
2013-10-31 12:20 - 2013-10-31 12:20 - 00000046 _____ C:\Windows\SysWOW64\Install.log
2013-10-20 06:10 - 2013-10-20 06:10 - 00013407 _____ C:\Users\Mike\Downloads\[kickass.to]formula.1.f1.2013.round.11.belgium.race.skyf1hd.sd.mp4.torrent
2013-10-20 06:07 - 2013-10-20 06:07 - 00001179 _____ C:\Users\Mike\Desktop\FrostWire 5.6.6.lnk
2013-10-20 06:01 - 2013-10-31 14:06 - 00000000 ____D C:\Program Files (x86)\InternetHelper3.1
2013-10-20 04:56 - 2013-10-31 14:08 - 00000000 ____D C:\Users\Mike\AppData\Roaming\defaulttab
2013-10-20 04:56 - 2013-10-20 04:56 - 00003364 _____ C:\Windows\System32\Tasks\BackgroundContainer Startup Task
2013-10-20 04:55 - 2013-10-31 14:08 - 00000000 ____D C:\Windows\SysWOW64\jmdp
2013-10-20 04:55 - 2013-10-31 14:06 - 00000000 ____D C:\Windows\SysWOW64\ARFC
2013-10-20 04:55 - 2013-10-31 14:06 - 00000000 ____D C:\ProgramData\Conduit
2013-10-20 04:55 - 2013-10-31 12:23 - 00000000 ____D C:\Users\Mike\AppData\Local\Conduit
2013-10-20 04:55 - 2013-10-20 06:01 - 00000009 _____ C:\END
2013-10-20 04:55 - 2013-10-20 06:01 - 00000000 ____D C:\Users\Mike\AppData\Local\CRE
2013-10-20 04:55 - 2013-10-20 06:00 - 00000000 ____D C:\Program Files (x86)\Conduit
2013-10-20 04:54 - 2013-10-31 14:06 - 00000000 ____D C:\Windows\SysWOW64\WNLT
2013-10-20 04:54 - 2013-07-17 08:20 - 01648432 _____ C:\Windows\System32\dmwu.exe
2013-10-20 04:54 - 2013-07-17 08:17 - 00033792 _____ (IncrediMail, Ltd.) C:\Windows\System32\ImHttpComm.dll
2013-10-17 12:32 - 2013-10-17 12:32 - 00013280 _____ C:\Users\Mike\Desktop\hs_err_pid4472.log

==================== One Month Modified Files and Folders =======

2013-11-14 16:08 - 2013-11-14 16:08 - 00000000 ____D C:\FRST
2013-11-14 13:18 - 2012-07-31 14:15 - 00000830 _____ C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-11-14 13:14 - 2011-07-13 07:28 - 00000894 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-11-14 12:14 - 2011-07-13 07:28 - 00000890 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-11-14 06:07 - 2011-05-09 14:48 - 00000000 ____D C:\ProgramData\MFAData
2013-11-14 05:28 - 2013-04-29 08:28 - 00002143 _____ C:\Users\Public\Desktop\Google Chrome.lnk
2013-11-14 04:55 - 2011-04-25 17:36 - 01868979 _____ C:\Windows\WindowsUpdate.log
2013-11-14 04:35 - 2009-07-13 20:45 - 00018864 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-11-14 04:35 - 2009-07-13 20:45 - 00018864 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-11-14 04:32 - 2009-07-13 21:13 - 00726444 _____ C:\Windows\System32\PerfStringBackup.INI
2013-11-14 04:28 - 2013-11-14 04:28 - 00299520 _____ C:\Users\Mike\AppData\Roaming\rqHOcIA87ht
2013-11-14 04:28 - 2013-11-14 04:28 - 00299520 _____ C:\Users\Mike\AppData\Local\uKnr5HzogvQ
2013-11-14 04:28 - 2013-11-14 04:28 - 00299520 _____ C:\ProgramData\AqhdHATJd20
2013-11-14 04:27 - 2013-06-22 16:42 - 00010150 _____ C:\Windows\setupact.log
2013-11-14 04:27 - 2009-07-13 21:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2013-11-13 13:59 - 2013-11-13 13:59 - 00300544 _____ C:\Users\Mike\AppData\Roaming\ixcBIbth
2013-11-13 13:59 - 2013-11-13 13:59 - 00300544 _____ C:\Users\Mike\AppData\Local\d97qL0Lkj
2013-11-13 13:59 - 2013-11-13 13:59 - 00300544 _____ C:\ProgramData\tEoiqf5H
2013-11-13 13:50 - 2013-11-13 13:50 - 00299520 _____ C:\Users\Mike\AppData\Roaming\2iTwdZnX
2013-11-13 13:50 - 2013-11-13 13:50 - 00299520 _____ C:\Users\Mike\AppData\Local\fWYZhgY3Y
2013-11-13 13:50 - 2013-11-13 13:50 - 00299520 _____ C:\ProgramData\ooZlO7udDo6
2013-11-13 13:43 - 2013-11-13 13:41 - 00000000 ____D C:\Users\Mike\AppData\Local\V8Upszhg7Z
2013-11-13 13:41 - 2013-11-13 13:41 - 00299520 _____ C:\Users\Mike\AppData\Roaming\1cJ2AnS4C4
2013-11-13 13:41 - 2013-11-13 13:41 - 00299520 _____ C:\Users\Mike\AppData\Local\QuicxYMZ
2013-11-13 13:41 - 2013-11-13 13:41 - 00299520 _____ C:\ProgramData\3wDL9YWthy
2013-11-13 01:32 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\rescache
2013-11-13 01:01 - 2011-06-08 08:23 - 00000000 ____D C:\ProgramData\Microsoft Help
2013-11-11 08:27 - 2011-04-25 18:52 - 00000000 ____D C:\users\Mike
2013-11-11 08:26 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-11-11 08:22 - 2013-11-11 08:22 - 01063424 ____T C:\ProgramData\gi7elffr.fdd
2013-11-11 08:22 - 2013-11-11 08:21 - 95025368 ____T C:\ProgramData\gi7elffr.bxx
2013-11-11 08:21 - 2013-11-11 08:21 - 00211456 _____ (Sato Corporation) C:\ProgramData\rffle7ig.dss
2013-11-11 08:21 - 2013-11-11 08:21 - 00061536 ____T (Microsoft Corporation) C:\ProgramData\gi7elffr.pss
2013-11-11 08:21 - 2013-11-11 08:21 - 00000000 _____ C:\ProgramData\gi7elffr.fvv
2013-11-10 13:12 - 2011-08-15 17:40 - 00012519 _____ C:\Users\Mike\Desktop\Mike and Christies Budget.xlsx
2013-11-10 10:32 - 2012-09-29 02:11 - 00046368 _____ (AVG Technologies) C:\Windows\System32\Drivers\avgtpx64.sys
2013-11-10 10:32 - 2012-09-29 02:11 - 00000000 ____D C:\Program Files (x86)\AVG Secure Search
2013-11-05 08:41 - 2011-11-20 15:18 - 00003182 _____ C:\Windows\System32\Tasks\HPCeeScheduleForMike
2013-11-05 08:41 - 2011-11-20 15:18 - 00000330 _____ C:\Windows\Tasks\HPCeeScheduleForMike.job
2013-10-31 14:08 - 2013-10-20 04:56 - 00000000 ____D C:\Users\Mike\AppData\Roaming\defaulttab
2013-10-31 14:08 - 2013-10-20 04:55 - 00000000 ____D C:\Windows\SysWOW64\jmdp
2013-10-31 14:08 - 2013-07-14 14:17 - 00000000 ____D C:\Program Files\Google
2013-10-31 14:08 - 2013-06-22 16:42 - 00047760 _____ C:\Windows\PFRO.log
2013-10-31 14:08 - 2011-07-13 07:28 - 00000000 ____D C:\Program Files (x86)\Google
2013-10-31 14:06 - 2013-10-20 06:01 - 00000000 ____D C:\Program Files (x86)\InternetHelper3.1
2013-10-31 14:06 - 2013-10-20 04:55 - 00000000 ____D C:\Windows\SysWOW64\ARFC
2013-10-31 14:06 - 2013-10-20 04:55 - 00000000 ____D C:\ProgramData\Conduit
2013-10-31 14:06 - 2013-10-20 04:54 - 00000000 ____D C:\Windows\SysWOW64\WNLT
2013-10-31 14:06 - 2011-10-03 14:06 - 00000000 ____D C:\Program Files (x86)\FrostWire 5
2013-10-31 12:23 - 2013-10-20 04:55 - 00000000 ____D C:\Users\Mike\AppData\Local\Conduit
2013-10-31 12:21 - 2011-07-13 07:28 - 00000000 ____D C:\Users\Mike\AppData\Local\Google
2013-10-31 12:21 - 2009-08-16 14:59 - 00000000 ___HD C:\Program Files (x86)\InstallShield Installation Information
2013-10-31 12:20 - 2013-10-31 12:20 - 00000046 _____ C:\Windows\SysWOW64\Install.log
2013-10-31 07:23 - 2013-03-18 13:28 - 00000258 __RSH C:\Users\Mike\ntuser.pol
2013-10-20 06:10 - 2013-10-20 06:10 - 00013407 _____ C:\Users\Mike\Downloads\[kickass.to]formula.1.f1.2013.round.11.belgium.race.skyf1hd.sd.mp4.torrent
2013-10-20 06:10 - 2011-10-03 14:07 - 00000000 ____D C:\Users\Mike\.frostwire5
2013-10-20 06:07 - 2013-10-20 06:07 - 00001179 _____ C:\Users\Mike\Desktop\FrostWire 5.6.6.lnk
2013-10-20 06:01 - 2013-10-20 04:55 - 00000009 _____ C:\END
2013-10-20 06:01 - 2013-10-20 04:55 - 00000000 ____D C:\Users\Mike\AppData\Local\CRE
2013-10-20 06:01 - 2012-07-31 14:15 - 00692616 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerApp.exe
2013-10-20 06:01 - 2012-07-31 14:15 - 00003768 _____ C:\Windows\System32\Tasks\Adobe Flash Player Updater
2013-10-20 06:01 - 2011-05-26 06:36 - 00071048 _____ (Adobe Systems Incorporated) C:\Windows\SysWOW64\FlashPlayerCPLApp.cpl
2013-10-20 06:00 - 2013-10-20 04:55 - 00000000 ____D C:\Program Files (x86)\Conduit
2013-10-20 06:00 - 2009-08-16 16:23 - 00000000 ____D C:\ProgramData\Adobe
2013-10-20 04:56 - 2013-10-20 04:56 - 00003364 _____ C:\Windows\System32\Tasks\BackgroundContainer Startup Task
2013-10-17 13:18 - 2012-07-09 12:41 - 00000000 ____D C:\Users\Mike\Desktop\Cover Letters
2013-10-17 12:32 - 2013-10-17 12:32 - 00013280 _____ C:\Users\Mike\Desktop\hs_err_pid4472.log

ZeroAccess:
C:\Windows\Installer\{b1358a06-4e88-6873-e912-8ff4ec2ea2cf}

ZeroAccess:
C:\$Recycle.Bin\S-1-5-21-1482467410-3658914024-4079621427-1000\$b1358a064e886873e9128ff4ec2ea2cf

ZeroAccess:
C:\$Recycle.Bin\S-1-5-18\$b1358a064e886873e9128ff4ec2ea2cf

Files to move or delete:
====================
C:\Users\Mike\AppData\Local\V8Upszhg7Z\B7zJDGxY5.exe
C:\ProgramData\23lldnur.pad
C:\ProgramData\2932675.pad
C:\ProgramData\4866093.pad
C:\ProgramData\87_fg.pad
C:\ProgramData\figlyptfdqhepfkjhuj.bat
C:\ProgramData\figlyptfdqhepfkjhuj.reg
C:\ProgramData\ism_0_llatsni.pad
C:\ProgramData\rffle7ig.dss
C:\Users\Mike\AppData\Roaming\skype.dat

Some content of TEMP:
====================
C:\Users\Mike\AppData\Local\Temp\1960_install_flashplayer11x32_mssd_aih.exe
C:\Users\Mike\AppData\Local\Temp\air195F.exe
C:\Users\Mike\AppData\Local\Temp\air6E84.exe
C:\Users\Mike\AppData\Local\Temp\BundleSweetIMSetup.exe
C:\Users\Mike\AppData\Local\Temp\iailhnktxohpeywjlke.exe
C:\Users\Mike\AppData\Local\Temp\MybabylonTB.exe
C:\Users\Mike\AppData\Local\Temp\tbSwee.dll
C:\Users\Mike\AppData\Local\Temp\~tmf121337825006503542.dll

==================== Known DLLs (Whitelisted) ================

==================== Bamital & volsnap Check =================

C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit

==================== EXE ASSOCIATION =====================

HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK

==================== Restore Points  =========================

4
Restore point made on: 2013-11-01 14:51:05
Restore point made on: 2013-11-04 07:35:29
Restore point made on: 2013-11-10 17:00:24
Restore point made on: 2013-11-13 01:00:27

==================== Memory info ===========================

Percentage of memory in use: 12%
Total physical RAM: 6134.88 MB
Available physical RAM: 5390.2 MB
Total Pagefile: 6133.03 MB
Available Pagefile: 5387.83 MB
Total Virtual: 8192 MB
Available Virtual: 8191.87 MB

==================== Drives ================================

Drive c: () (Fixed) (Total:450.43 GB) (Free:338.15 GB) NTFS ==>[system with boot components (obtained from reading drive)]
Drive e: (RECOVERY) (Fixed) (Total:15.04 GB) (Free:0 GB) NTFS ==>[system with boot components (obtained from reading drive)]
Drive f: (HP_TOOLS) (Fixed) (Total:0.1 GB) (Free:0.09 GB) FAT32
Drive g: (Eme 4-2 to 5-6-2013) (CDROM) (Total:0.45 GB) (Free:0 GB) UDF
Drive h: () (Removable) (Total:0.06 GB) (Free:0.05 GB) FAT
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
Drive y: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.16 GB) NTFS ==>[system with boot components (obtained from reading drive)]

==================== MBR & Partition Table ==================

========================================================
Disk: 0 (Size: 466 GB) (Disk ID: 44C64793)
Partition 1: (Active) - (Size=199 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=450 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=15 GB) - (Type=07 NTFS)
Partition 4: (Not Active) - (Size=103 MB) - (Type=0C)

========================================================
Disk: 1 (Size: 62 MB) (Disk ID: 00000000)
Partition 1: (Active) - (Size=62 MB) - (Type=06)

LastRegBack: 2013-11-10 11:01

==================== End Of Log ============================

Link to post
Share on other sites

Please read the following information first.

 

You're infected with Rootkit.ZeroAccess, a BackDoor Trojan.

BACKDOOR WARNING

------------------------------

One or more of the identified infections is known to use a backdoor.

This allows hackers to remotely control your computer, steal critical system information and download and execute files.

I would advice you to disconnect this PC from the Internet immediately. If you do any banking or other financial transactions on the PC or if it should contain any other sensitive information, please get to a known clean computer and change all passwords where applicable, and it would be wise to contact those same financial institutions to apprise them of your situation.

Though the infection has been identified and because of it's backdoor functionality, your PC is very likely compromised and there is no way to be sure your computer can ever again be trusted. Many experts in the security community believe that once infected with this type of trojan, the best course of action would be a reformat and reinstall of the OS. Please read these for more information:

How Do I Handle Possible Identify Theft, Internet Fraud and CC Fraud?

http://www.dslreports.com/faq/10451

When Should I Format, How Should I Reinstall

http://www.dslreports.com/faq/10063

I will try my best to clean this machine but I can't guarantee that it will be 100% secure afterwards.

I would change all my passwords and keep a close eye on all your sensitive accounts.

Let me know what you decide to do. If you decide to go through with the cleanup, please proceed with the following steps.

-----------------------------------------

OK, here you go......this should get you going:

Please download the attached fixlist.txt and copy it to your flashdrive.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options. (as you did before)

Run FRST64 or FRST (which ever one you're using) and press the Fix button just once and wait.

The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

See if the computer boots normally now and if so..........run MBAR

If not...rescan with FRST and post the new log

Download Malwarebytes Anti-Rootkit from HERE

  • Unzip the contents to a folder in a convenient location.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
  • Wait while the system shuts down and the cleanup process is performed.
  • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log.txt and system-log.txt
To attach a log if needed:

Bottom right corner of this page.

reply1.jpg

New window that comes up.

replyer1.jpg

~~~~~~~~~~~~~~~~~~~~~~~

Note:

If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:

Internet access

Windows Update

Windows Firewall

If there are additional problems with your system, such as any of those listed above or other system issues, then run the fixdamage tool included with Malwarebytes Anti-Rootkit and reboot. It's located in the Plugins folder which is in the MBAR folder.

Just run fixdamage.exe.

Verify that they are now functioning normally.

MrC

Link to post
Share on other sites

Hi,

 

I ran the fix and am able to boot my computer successfully! I downloaded mbar and unzipped on to my desktop, however, when I click on the folder it seems to lock my computer requiring me to turn off and restart.  It restarts successfully though.

 

Attached is the Fixlog

 

 

 

I will await further instructions.

 

 

 

 

Fixlog.txt

Link to post
Share on other sites

Try this one:

Please read the directions carefully so you don't end up deleting something that is good!!

If in doubt about an entry....please ask or choose Skip!!!!

Don't Delete anything unless instructed to!

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

If a suspicious object is detected, the default action will be Skip, click on Continue

Please note that TDSSKiller can be run in safe mode if needed.

Please download the latest version of TDSSKiller from HERE and save it to your Desktop.

  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters.

    image000q.png

  • Put a checkmark beside loaded modules.

    2012081514h0118.png

  • A reboot will be needed to apply the changes. Do it.
  • TDSSKiller will launch automatically after the reboot. Also your computer may seem very slow and unusable. This is normal. Give it enough time to load your background programs.
  • Then click on Change parameters in TDSSKiller.
  • Check all boxes then click OK.

    clip.jpg

  • Click the Start Scan button.

    19695967.jpg

  • The scan should take no longer than 2 minutes.
  • If a suspicious object is detected, the default action will be Skip, click on Continue.

    67776163.jpg

    Any entries like this: \Device\Harddisk0\DR0 ( TDSS File System ) - please choose Skip.

    If in doubt about an entry....please ask or choose Skip

  • If malicious objects are found, they will show in the Scan results - Select action for found objects and offer three options.

    Ensure Cure (default) is selected, then click Continue > Reboot now to finish the cleaning process.

    62117367.jpg

    Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

  • A report will be created in your root directory, (usually C:\ folder) in the form of "TDSSKiller.[Version]_[Date]_[Time]_log.txt". Please copy and paste the contents of that file here. There may be 3 logs > so post or attach all of them.
  • Sometimes these logs can be very large, in that case please attach it or zip it up and attach it.

Here's a summary of what to do if you would like to print it out:

If in doubt about an entry....please ask or choose Skip

Don't Delete anything unless instructed to!

If a suspicious object is detected, the default action will be Skip, click on Continue

If you get the warning about a file UnsignedFile.Multi.Generic or LockedFile.Multi.Generic please choose

Skip and click on Continue

Any entries like this: \Device\Harddisk0\DR0 ( TDSS File System ) - please choose Skip.

If malicious objects are found, they will show in the Scan results and offer three (3) options.

Ensure Cure is selected, then click Continue => Reboot now to finish the cleaning process.

Note: If Cure is not available, please choose Skip instead, do not choose Delete unless instructed.

~~~~~~~~~~~~~~~~~~~~

You can attach the logs if they're too long:

Bottom right corner of this page.

reply1.jpg

New window that comes up.

replyer1.jpg

MrC

Link to post
Share on other sites

Yes skip it.....

Next:

Please download and run ComboFix.

The most important things to remember when running it is to disable all your malware programs and run Combofix from your desktop.

Please visit this webpage for download links, and instructions for running ComboFix

http://www.bleepingcomputer.com/combofix/how-to-use-combofix

Please make sure you click download buttons that look like this, not "sponsored ad links":

bleep-crop.jpg

Ensure you have disabled all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Information on disabling your malware programs can be found Here.

Make sure you run ComboFix from your desktop.

Give it at least 30-45 minutes to finish if needed.

Please include the C:\ComboFix.txt in your next reply for further review.

---------->NOTE<----------

If you get the message Illegal operation attempted on registry key that has been marked for deletion after you run ComboFix....please reboot the computer, this should resolve the problem. You may have to do this several times if needed.

MrC

Link to post
Share on other sites

Lets clean out any adware/spyware now: (this will require a reboot so save all your work)

Please download AdwCleaner by Xplode and save to your Desktop.

Make sure you click on download buttons that look like this, not "sponsored ad links":

bleep-crop.jpg

  • Double click on AdwCleaner.exe to run the tool.

    Vista/Windows 7/8 users right-click and select Run As Administrator

  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • When it's done you'll see: Pending: Please uncheck elements you don't want removed.
  • Now click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • Look over the log especially under Files/Folders for any program you want to save.
  • If there's a program you may want to save, just uncheck it from AdwCleaner.
  • If you're not sure, post the log for review. (all items found are adware/spyware/foistware)
  • If you're ready to clean it all up.....click the Clean button.
  • After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.
  • Items that are deleted are moved to the Quarantine Folder: C:\AdwCleaner\Quarantine
  • To restore an item that has been deleted:
  • Go to Tools > Quarantine Manager > check what you want restored > now click on Restore.
Then..................

Open up Malwarebytes > Settings Tab > Scanner Settings > Under action for PUP > Select: Show in Results List and Check for removal.

Please Update and run a Quick Scan with Malwarebytes Anti-Malware, post the report.

Make sure that everything is checked, and click Remove Selected.

Please let me know how computer is running now, MrC

Link to post
Share on other sites

MrC

 

The following is the txt from running frst64...

 

FYI, I will be out of town from 11/22/2013 through 11/24/2013 without an internet connection. 

 

I will be able to run the fix on Sunday or Monday.

 

Thanks again for all your help. I see an application to paypal in my future.

 

 

 

 

Scan result of Farbar Recovery Scan Tool (FRST.txt) (x64) Version: 18-11-2013
Ran by SYSTEM on MININT-ALFJ5ES on 21-11-2013 16:30:07
Running from H:\
Windows 7 Home Premium (X64) OS Language: English(US)
Internet Explorer Version 10
Boot Mode: Recovery
 
The current controlset is ControlSet001
ATTENTION!:=====> If the system is bootable FRST could be run from normal or Safe mode to create a complete log.
 
==================== Registry (Whitelisted) ==================
 
HKLM\...\Run: [synTPEnh] - C:\Program Files\Synaptics\SynTP\SynTPEnh.exe [1815848 2009-07-14] (Synaptics Incorporated)
HKLM\...\Run: [smartMenu] - C:\Program Files\Hewlett-Packard\HP MediaSmart\SmartMenu.exe [610872 2009-07-21] ()
HKLM\...\Run: [intelTBRunOnce] - C:\Program Files\Intel\TurboBoost\RunTBGadgetOnce.vbs [4526 2010-11-29] ()
HKLM\...\Run: [NvCplDaemon] - RUNDLL32.EXE C:\Windows\system32\NvCpl.dll,NvStartup
HKLM\...\Run: [sysTrayApp] - C:\Program Files\IDT\WDM\sttray64.exe [450048 2009-07-21] (IDT, Inc.)
HKLM\...\Run: [Logitech Download Assistant] - C:\Windows\system32\rundll32.exe C:\Windows\System32\LogiLDA.dll,LogiFetch
HKLM-x32\...\Run: [GrooveMonitor] - C:\Program Files (x86)\Microsoft Office\Office12\GrooveMonitor.exe [30040 2009-02-26] (Microsoft Corporation)
HKLM-x32\...\Run: [Adobe ARM] - C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe [958576 2013-04-04] (Adobe Systems Incorporated)
HKLM-x32\...\Run: [QuickTime Task] - C:\Program Files (x86)\QuickTime\QTTask.exe [421888 2013-05-01] (Apple Inc.)
HKLM-x32\...\Run: [APSDaemon] - C:\Program Files (x86)\Common Files\Apple\Apple Application Support\APSDaemon.exe [59720 2013-04-21] (Apple Inc.)
HKU\Default\...\Run: [HPADVISOR] - C:\Program Files (x86)\Hewlett-Packard\HP Advisor\HPAdvisor.exe [1668664 2009-07-15] (Hewlett-Packard)
HKU\Default\...\Policies\system: [WallpaperStyle] 2
HKU\Default User\...\Run: [HPADVISOR] - C:\Program Files (x86)\Hewlett-Packard\HP Advisor\HPAdvisor.exe [1668664 2009-07-15] (Hewlett-Packard)
HKU\Default User\...\Policies\system: [WallpaperStyle] 2
HKU\Mike\...\Run: [DcIEKQn5p.exe] - C:\Users\Mike\AppData\Local\8ejGD9CIoDO\DcIEKQn5p.exe [164576 2013-11-20] (Microsoft Corporation)
HKU\Mike\...\Winlogon: [shell] cmd.exe [345088 2010-11-20] (Microsoft Corporation) <==== ATTENTION 
HKU\Mike\...\Command Processor: "C:\Users\Mike\AppData\Local\8ejGD9CIoDO\DcIEKQn5p.exe" <===== ATTENTION!
HKU\UpdatusUser\...\Run: [HPADVISOR] - C:\Program Files (x86)\Hewlett-Packard\HP Advisor\HPAdvisor.exe [1668664 2009-07-15] (Hewlett-Packard)
HKU\UpdatusUser\...\Policies\system: [WallpaperStyle] 2
Startup: C:\Users\Mike\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Intel® Turbo Boost Technology Monitor 2.0.lnk
ShortcutTarget: Intel® Turbo Boost Technology Monitor 2.0.lnk -> C:\Program Files\Intel\TurboBoost\SignalIslandUi.exe (Intel® Corporation)
 
==================== Services (Whitelisted) =================
 
S2 AESTFilters; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_ccf0dd3cb081af84\AESTSr64.exe [89600 2009-03-02] (Andrea Electronics Corporation)
S2 FreeWordHelper; C:\Program Files (x86)\FreeWordHelper\FreeWordHelperUpdt.exe [1778176 2011-12-15] ()
S2 MBAMScheduler; C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamscheduler.exe [418376 2013-04-04] (Malwarebytes Corporation)
S2 MBAMService; C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbamservice.exe [701512 2013-04-04] (Malwarebytes Corporation)
S2 PCDocPDFUpdt; C:\Program Files (x86)\PCHealthDocPDFReader\PCDocPDFUpdt.exe [686592 2012-03-05] ()
S2 STacSV; C:\Windows\System32\DriverStore\FileRepository\stwrt64.inf_amd64_neutral_ccf0dd3cb081af84\STacSV64.exe [240128 2009-07-21] (IDT, Inc.)
S2 HP Support Assistant Service; "C:\Program Files (x86)\Hewlett-Packard\HP Support Framework\hpsa_service.exe" [x]
S2 UtilityChest_49Service; C:\PROGRA~2\UTILIT~2\bar\1.bin\49barsvc.exe [x]
 
==================== Drivers (Whitelisted) ====================
 
S3 mbamchameleon; C:\Windows\system32\drivers\mbamchameleon.sys [91352 2013-11-15] (Malwarebytes Corporation)
S3 MBAMProtector; C:\Windows\system32\drivers\mbam.sys [25928 2013-04-04] (Malwarebytes Corporation)
S5 AppMgmt; C:\Windows\system32\svchost.exe [27136 2009-07-13] (Microsoft Corporation)
S3 catchme; \??\C:\ComboFix\catchme.sys [x]
 
==================== NetSvcs (Whitelisted) ===================
 
 
==================== One Month Created Files and Folders ========
 
2013-11-20 14:07 - 2013-11-20 14:10 - 00000000 ____D C:\Users\Mike\AppData\Local\8ejGD9CIoDO
2013-11-20 14:07 - 2013-11-20 14:07 - 00300544 _____ C:\Users\Mike\AppData\Roaming\1AKiTP76
2013-11-20 14:07 - 2013-11-20 14:07 - 00300544 _____ C:\Users\Mike\AppData\Local\2kU1RA4nHzs
2013-11-20 14:07 - 2013-11-20 14:07 - 00300544 _____ C:\ProgramData\GiGeoBRhLG
2013-11-20 14:07 - 2013-11-20 14:07 - 00000000 ____D C:\ProgramData\efl
2013-11-20 13:40 - 2013-11-20 13:40 - 00015764 _____ C:\Users\Mike\Desktop\AdwCleaner[s0].txt
2013-11-19 18:13 - 2013-11-20 13:35 - 00000000 ____D C:\AdwCleaner
2013-11-19 18:13 - 2013-11-19 18:13 - 01085542 _____ C:\Users\Mike\Desktop\AdwCleaner.exe
2013-11-19 18:12 - 2013-11-19 18:12 - 01085542 _____ C:\Users\Mike\Downloads\AdwCleaner.exe
2013-11-18 17:55 - 2013-11-18 17:55 - 00021713 _____ C:\Users\Mike\Desktop\combofix.txt
2013-11-18 17:46 - 2013-11-18 17:46 - 00021713 _____ C:\ComboFix.txt
2013-11-18 17:31 - 2013-11-18 17:46 - 00000000 ____D C:\ComboFix
2013-11-18 17:31 - 2011-06-25 22:45 - 00256000 _____ C:\Windows\PEV.exe
2013-11-18 17:31 - 2010-11-07 09:20 - 00208896 _____ C:\Windows\MBR.exe
2013-11-18 17:31 - 2009-04-19 20:56 - 00060416 _____ (NirSoft) C:\Windows\NIRCMD.exe
2013-11-18 17:31 - 2000-08-30 16:00 - 00518144 _____ (SteelWerX) C:\Windows\SWREG.exe
2013-11-18 17:31 - 2000-08-30 16:00 - 00406528 _____ (SteelWerX) C:\Windows\SWSC.exe
2013-11-18 17:31 - 2000-08-30 16:00 - 00098816 _____ C:\Windows\sed.exe
2013-11-18 17:31 - 2000-08-30 16:00 - 00080412 _____ C:\Windows\grep.exe
2013-11-18 17:31 - 2000-08-30 16:00 - 00068096 _____ C:\Windows\zip.exe
2013-11-17 17:35 - 2013-11-18 17:46 - 00000000 ____D C:\Qoobox
2013-11-17 17:35 - 2013-11-18 17:45 - 00000000 ____D C:\Windows\erdnt
2013-11-17 17:34 - 2013-11-18 17:30 - 05146764 ____R (Swearware) C:\Users\Mike\Desktop\ComboFix.exe
2013-11-17 11:13 - 2013-11-17 11:14 - 04121440 _____ (Kaspersky Lab ZAO) C:\Users\Mike\Downloads\tdsskiller.exe
2013-11-15 14:31 - 2013-11-15 14:31 - 12576792 _____ (Malwarebytes Corp.) C:\Users\Mike\Downloads\mbar-1.07.0.1007.exe
2013-11-15 14:31 - 2013-11-15 14:31 - 12576792 _____ (Malwarebytes Corp.) C:\Users\Mike\Downloads\mbar-1.07.0.1007 (1).exe
2013-11-15 14:24 - 2013-11-15 14:31 - 00091352 _____ (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbamchameleon.sys
2013-11-15 14:24 - 2013-11-15 14:31 - 00000000 ____D C:\Users\Mike\Desktop\mbar
2013-11-14 16:08 - 2013-11-14 16:08 - 00000000 ____D C:\FRST
2013-11-13 01:02 - 2013-10-12 00:45 - 00051712 _____ (Microsoft Corporation) C:\Windows\System32\ie4uinit.exe
2013-11-13 01:02 - 2013-10-12 00:43 - 03959808 _____ (Microsoft Corporation) C:\Windows\System32\jscript9.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 02648576 _____ (Microsoft Corporation) C:\Windows\System32\iertutil.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00855552 _____ (Microsoft Corporation) C:\Windows\System32\jscript.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00603136 _____ (Microsoft Corporation) C:\Windows\System32\msfeeds.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00526336 _____ (Microsoft Corporation) C:\Windows\System32\ieui.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00136704 _____ (Microsoft Corporation) C:\Windows\System32\iesysprep.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00067072 _____ (Microsoft Corporation) C:\Windows\System32\iesetup.dll
2013-11-13 01:02 - 2013-10-12 00:43 - 00039936 _____ (Microsoft Corporation) C:\Windows\System32\iernonce.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 02877952 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript9.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 02049024 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iertutil.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00690688 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jscript.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00493056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\msfeeds.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00391168 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieui.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00109056 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesysprep.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00061440 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iesetup.dll
2013-11-13 01:02 - 2013-10-11 23:02 - 00033280 _____ (Microsoft Corporation) C:\Windows\SysWOW64\iernonce.dll
2013-11-13 01:02 - 2013-10-11 22:35 - 02706432 _____ (Microsoft Corporation) C:\Windows\System32\mshtml.tlb
2013-11-13 01:02 - 2013-10-11 22:08 - 02706432 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.tlb
2013-11-13 01:02 - 2013-10-11 21:44 - 00089600 _____ (Microsoft Corporation) C:\Windows\System32\RegisterIEPKEYs.exe
2013-11-13 01:02 - 2013-10-11 21:15 - 00071680 _____ (Microsoft Corporation) C:\Windows\SysWOW64\RegisterIEPKEYs.exe
2013-11-13 01:01 - 2013-10-12 00:45 - 02241536 _____ (Microsoft Corporation) C:\Windows\System32\wininet.dll
2013-11-13 01:01 - 2013-10-12 00:45 - 01364992 _____ (Microsoft Corporation) C:\Windows\System32\urlmon.dll
2013-11-13 01:01 - 2013-10-12 00:43 - 19269632 _____ (Microsoft Corporation) C:\Windows\System32\mshtml.dll
2013-11-13 01:01 - 2013-10-12 00:43 - 15404544 _____ (Microsoft Corporation) C:\Windows\System32\ieframe.dll
2013-11-13 01:01 - 2013-10-12 00:43 - 00053248 _____ (Microsoft Corporation) C:\Windows\System32\jsproxy.dll
2013-11-13 01:01 - 2013-10-11 23:03 - 01767936 _____ (Microsoft Corporation) C:\Windows\SysWOW64\wininet.dll
2013-11-13 01:01 - 2013-10-11 23:03 - 01138176 _____ (Microsoft Corporation) C:\Windows\SysWOW64\urlmon.dll
2013-11-13 01:01 - 2013-10-11 23:02 - 14355968 _____ (Microsoft Corporation) C:\Windows\SysWOW64\mshtml.dll
2013-11-13 01:01 - 2013-10-11 23:02 - 13761024 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ieframe.dll
2013-11-13 01:01 - 2013-10-11 23:02 - 00039424 _____ (Microsoft Corporation) C:\Windows\SysWOW64\jsproxy.dll
2013-11-12 23:53 - 2013-10-11 18:30 - 00830464 _____ (Microsoft Corporation) C:\Windows\System32\nshwfp.dll
2013-11-12 23:53 - 2013-10-11 18:29 - 00859648 _____ (Microsoft Corporation) C:\Windows\System32\IKEEXT.DLL
2013-11-12 23:53 - 2013-10-11 18:29 - 00324096 _____ (Microsoft Corporation) C:\Windows\System32\FWPUCLNT.DLL
2013-11-12 23:53 - 2013-10-11 18:03 - 00656896 _____ (Microsoft Corporation) C:\Windows\SysWOW64\nshwfp.dll
2013-11-12 23:53 - 2013-10-11 18:01 - 00216576 _____ (Microsoft Corporation) C:\Windows\SysWOW64\FWPUCLNT.DLL
2013-11-12 23:53 - 2013-10-05 12:25 - 01474048 _____ (Microsoft Corporation) C:\Windows\System32\crypt32.dll
2013-11-12 23:53 - 2013-10-05 11:57 - 01168384 _____ (Microsoft Corporation) C:\Windows\SysWOW64\crypt32.dll
2013-11-12 23:53 - 2013-10-03 18:28 - 00190464 _____ (Microsoft Corporation) C:\Windows\System32\SmartcardCredentialProvider.dll
2013-11-12 23:53 - 2013-10-03 18:25 - 00197120 _____ (Microsoft Corporation) C:\Windows\System32\credui.dll
2013-11-12 23:53 - 2013-10-03 18:24 - 01930752 _____ (Microsoft Corporation) C:\Windows\System32\authui.dll
2013-11-12 23:53 - 2013-10-03 17:58 - 00152576 _____ (Microsoft Corporation) C:\Windows\SysWOW64\SmartcardCredentialProvider.dll
2013-11-12 23:53 - 2013-10-03 17:56 - 01796096 _____ (Microsoft Corporation) C:\Windows\SysWOW64\authui.dll
2013-11-12 23:53 - 2013-10-03 17:56 - 00168960 _____ (Microsoft Corporation) C:\Windows\SysWOW64\credui.dll
2013-11-12 23:53 - 2013-10-02 18:23 - 00404480 _____ (Microsoft Corporation) C:\Windows\System32\gdi32.dll
2013-11-12 23:53 - 2013-10-02 18:00 - 00311808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\gdi32.dll
2013-11-12 23:53 - 2013-09-27 17:09 - 00497152 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\afd.sys
2013-11-12 23:53 - 2013-09-24 18:26 - 00154560 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\ksecpkg.sys
2013-11-12 23:53 - 2013-09-24 18:26 - 00095680 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\ksecdd.sys
2013-11-12 23:53 - 2013-09-24 18:23 - 00135680 _____ (Microsoft Corporation) C:\Windows\System32\sspicli.dll
2013-11-12 23:53 - 2013-09-24 18:23 - 00028672 _____ (Microsoft Corporation) C:\Windows\System32\sspisrv.dll
2013-11-12 23:53 - 2013-09-24 18:23 - 00028160 _____ (Microsoft Corporation) C:\Windows\System32\secur32.dll
2013-11-12 23:53 - 2013-09-24 18:22 - 00340992 _____ (Microsoft Corporation) C:\Windows\System32\schannel.dll
2013-11-12 23:53 - 2013-09-24 18:21 - 01447936 _____ (Microsoft Corporation) C:\Windows\System32\lsasrv.dll
2013-11-12 23:53 - 2013-09-24 18:21 - 00307200 _____ (Microsoft Corporation) C:\Windows\System32\ncrypt.dll
2013-11-12 23:53 - 2013-09-24 17:58 - 00096768 _____ (Microsoft Corporation) C:\Windows\SysWOW64\sspicli.dll
2013-11-12 23:53 - 2013-09-24 17:57 - 00247808 _____ (Microsoft Corporation) C:\Windows\SysWOW64\schannel.dll
2013-11-12 23:53 - 2013-09-24 17:57 - 00022016 _____ (Microsoft Corporation) C:\Windows\SysWOW64\secur32.dll
2013-11-12 23:53 - 2013-09-24 17:56 - 00220160 _____ (Microsoft Corporation) C:\Windows\SysWOW64\ncrypt.dll
2013-11-12 23:53 - 2013-09-24 17:03 - 00030720 _____ (Microsoft Corporation) C:\Windows\System32\lsass.exe
2013-11-12 23:53 - 2013-07-04 04:18 - 00458712 _____ (Microsoft Corporation) C:\Windows\System32\Drivers\cng.sys
2013-10-31 12:20 - 2013-10-31 12:20 - 00000046 _____ C:\Windows\SysWOW64\Install.log
 
==================== One Month Modified Files and Folders =======
 
2013-11-20 14:10 - 2013-11-20 14:07 - 00000000 ____D C:\Users\Mike\AppData\Local\8ejGD9CIoDO
2013-11-20 14:08 - 2011-04-25 17:36 - 01204863 _____ C:\Windows\WindowsUpdate.log
2013-11-20 14:07 - 2013-11-20 14:07 - 00300544 _____ C:\Users\Mike\AppData\Roaming\1AKiTP76
2013-11-20 14:07 - 2013-11-20 14:07 - 00300544 _____ C:\Users\Mike\AppData\Local\2kU1RA4nHzs
2013-11-20 14:07 - 2013-11-20 14:07 - 00300544 _____ C:\ProgramData\GiGeoBRhLG
2013-11-20 14:07 - 2013-11-20 14:07 - 00000000 ____D C:\ProgramData\efl
2013-11-20 13:44 - 2009-07-13 20:45 - 00018864 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0
2013-11-20 13:44 - 2009-07-13 20:45 - 00018864 ____H C:\Windows\System32\7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0
2013-11-20 13:42 - 2009-07-13 21:13 - 00726444 _____ C:\Windows\System32\PerfStringBackup.INI
2013-11-20 13:40 - 2013-11-20 13:40 - 00015764 _____ C:\Users\Mike\Desktop\AdwCleaner[s0].txt
2013-11-20 13:37 - 2013-06-22 16:42 - 00010542 _____ C:\Windows\setupact.log
2013-11-20 13:37 - 2011-07-13 07:28 - 00000890 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineCore.job
2013-11-20 13:37 - 2009-07-13 21:08 - 00000006 ____H C:\Windows\Tasks\SA.DAT
2013-11-20 13:35 - 2013-11-19 18:13 - 00000000 ____D C:\AdwCleaner
2013-11-20 13:18 - 2012-07-31 14:15 - 00000830 _____ C:\Windows\Tasks\Adobe Flash Player Updater.job
2013-11-20 13:14 - 2011-07-13 07:28 - 00000894 _____ C:\Windows\Tasks\GoogleUpdateTaskMachineUA.job
2013-11-19 18:13 - 2013-11-19 18:13 - 01085542 _____ C:\Users\Mike\Desktop\AdwCleaner.exe
2013-11-19 18:12 - 2013-11-19 18:12 - 01085542 _____ C:\Users\Mike\Downloads\AdwCleaner.exe
2013-11-18 17:55 - 2013-11-18 17:55 - 00021713 _____ C:\Users\Mike\Desktop\combofix.txt
2013-11-18 17:46 - 2013-11-18 17:46 - 00021713 _____ C:\ComboFix.txt
2013-11-18 17:46 - 2013-11-18 17:31 - 00000000 ____D C:\ComboFix
2013-11-18 17:46 - 2013-11-17 17:35 - 00000000 ____D C:\Qoobox
2013-11-18 17:46 - 2009-07-13 19:20 - 00000000 __RHD C:\users\Default
2013-11-18 17:45 - 2013-11-17 17:35 - 00000000 ____D C:\Windows\erdnt
2013-11-18 17:42 - 2009-07-13 18:34 - 00000215 _____ C:\Windows\system.ini
2013-11-18 17:41 - 2013-06-22 16:42 - 00061042 _____ C:\Windows\PFRO.log
2013-11-18 17:41 - 2011-05-09 14:48 - 00000000 ____D C:\ProgramData\MFAData
2013-11-18 17:38 - 2012-03-26 17:29 - 00000000 ____D C:\Program Files (x86)\FreeWordHelper
2013-11-18 17:30 - 2013-11-17 17:34 - 05146764 ____R (Swearware) C:\Users\Mike\Desktop\ComboFix.exe
2013-11-17 16:16 - 2013-04-29 08:28 - 00002143 _____ C:\Users\Public\Desktop\Google Chrome.lnk
2013-11-17 11:14 - 2013-11-17 11:13 - 04121440 _____ (Kaspersky Lab ZAO) C:\Users\Mike\Downloads\tdsskiller.exe
2013-11-15 14:31 - 2013-11-15 14:31 - 12576792 _____ (Malwarebytes Corp.) C:\Users\Mike\Downloads\mbar-1.07.0.1007.exe
2013-11-15 14:31 - 2013-11-15 14:31 - 12576792 _____ (Malwarebytes Corp.) C:\Users\Mike\Downloads\mbar-1.07.0.1007 (1).exe
2013-11-15 14:31 - 2013-11-15 14:24 - 00091352 _____ (Malwarebytes Corporation) C:\Windows\System32\Drivers\mbamchameleon.sys
2013-11-15 14:31 - 2013-11-15 14:24 - 00000000 ____D C:\Users\Mike\Desktop\mbar
2013-11-14 16:08 - 2013-11-14 16:08 - 00000000 ____D C:\FRST
2013-11-13 01:32 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\rescache
2013-11-13 01:01 - 2011-06-08 08:23 - 00000000 ____D C:\ProgramData\Microsoft Help
2013-11-11 08:27 - 2011-04-25 18:52 - 00000000 ____D C:\users\Mike
2013-11-11 08:26 - 2009-07-13 19:20 - 00000000 ____D C:\Windows\registration
2013-11-10 13:12 - 2011-08-15 17:40 - 00012519 _____ C:\Users\Mike\Desktop\Mike and Christies Budget.xlsx
2013-11-05 08:41 - 2011-11-20 15:18 - 00003182 _____ C:\Windows\System32\Tasks\HPCeeScheduleForMike
2013-11-05 08:41 - 2011-11-20 15:18 - 00000330 _____ C:\Windows\Tasks\HPCeeScheduleForMike.job
2013-10-31 14:08 - 2013-07-14 14:17 - 00000000 ____D C:\Program Files\Google
2013-10-31 14:08 - 2011-07-13 07:28 - 00000000 ____D C:\Program Files (x86)\Google
2013-10-31 14:06 - 2011-10-03 14:06 - 00000000 ____D C:\Program Files (x86)\FrostWire 5
2013-10-31 12:21 - 2011-07-13 07:28 - 00000000 ____D C:\Users\Mike\AppData\Local\Google
2013-10-31 12:21 - 2009-08-16 14:59 - 00000000 ___HD C:\Program Files (x86)\InstallShield Installation Information
2013-10-31 12:20 - 2013-10-31 12:20 - 00000046 _____ C:\Windows\SysWOW64\Install.log
2013-10-31 07:23 - 2013-03-18 13:28 - 00000258 __RSH C:\Users\Mike\ntuser.pol
 
Files to move or delete:
====================
C:\Users\Mike\AppData\Local\8ejGD9CIoDO\DcIEKQn5p.exe
 
 
Some content of TEMP:
====================
C:\Users\Mike\AppData\Local\Temp\Quarantine.exe
C:\Users\Mike\AppData\Local\Temp\~tmf6405294042863795206.dll
 
 
==================== Known DLLs (Whitelisted) ================
 
 
==================== Bamital & volsnap Check =================
 
C:\Windows\System32\winlogon.exe => MD5 is legit
C:\Windows\System32\wininit.exe => MD5 is legit
C:\Windows\SysWOW64\wininit.exe => MD5 is legit
C:\Windows\explorer.exe => MD5 is legit
C:\Windows\SysWOW64\explorer.exe => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\SysWOW64\svchost.exe => MD5 is legit
C:\Windows\System32\services.exe => MD5 is legit
C:\Windows\System32\User32.dll => MD5 is legit
C:\Windows\SysWOW64\User32.dll => MD5 is legit
C:\Windows\System32\userinit.exe => MD5 is legit
C:\Windows\SysWOW64\userinit.exe => MD5 is legit
C:\Windows\System32\Drivers\volsnap.sys => MD5 is legit
 
==================== EXE ASSOCIATION =====================
 
HKLM\...\.exe: exefile => OK
HKLM\...\exefile\DefaultIcon: %1 => OK
HKLM\...\exefile\open\command: "%1" %* => OK
 
==================== Restore Points  =========================
 
7
Restore point made on: 2013-11-01 14:51:05
Restore point made on: 2013-11-04 07:35:29
Restore point made on: 2013-11-10 17:00:24
Restore point made on: 2013-11-13 01:00:27
Restore point made on: 2013-11-17 17:00:24
Restore point made on: 2013-11-17 17:38:15
Restore point made on: 2013-11-17 17:42:06
 
==================== Memory info =========================== 
 
Percentage of memory in use: 12%
Total physical RAM: 6134.88 MB
Available physical RAM: 5381.34 MB
Total Pagefile: 6133.03 MB
Available Pagefile: 5364.32 MB
Total Virtual: 8192 MB
Available Virtual: 8191.88 MB
 
==================== Drives ================================
 
Drive c: () (Fixed) (Total:450.43 GB) (Free:336.4 GB) NTFS ==>[system with boot components (obtained from reading drive)]
Drive e: (RECOVERY) (Fixed) (Total:15.04 GB) (Free:0 GB) NTFS ==>[system with boot components (obtained from reading drive)]
Drive f: (HP_TOOLS) (Fixed) (Total:0.1 GB) (Free:0.09 GB) FAT32
Drive g: (Eme 4-2 to 5-6-2013) (CDROM) (Total:0.45 GB) (Free:0 GB) UDF
Drive h: () (Removable) (Total:0.06 GB) (Free:0.05 GB) FAT
Drive x: (Boot) (Fixed) (Total:0.03 GB) (Free:0.03 GB) NTFS
Drive y: (SYSTEM) (Fixed) (Total:0.19 GB) (Free:0.16 GB) NTFS ==>[system with boot components (obtained from reading drive)]
 
==================== MBR & Partition Table ==================
 
========================================================
Disk: 0 (Size: 466 GB) (Disk ID: 44C64793)
Partition 1: (Active) - (Size=199 MB) - (Type=07 NTFS)
Partition 2: (Not Active) - (Size=450 GB) - (Type=07 NTFS)
Partition 3: (Not Active) - (Size=15 GB) - (Type=07 NTFS)
Partition 4: (Not Active) - (Size=103 MB) - (Type=0C)
 
========================================================
Disk: 1 (Size: 62 MB) (Disk ID: 00000000)
Partition 1: (Active) - (Size=62 MB) - (Type=06)
 
 
LastRegBack: 2013-11-19 22:55
 
==================== End Of Log ============================
Link to post
Share on other sites

Please download the attached fixlist.txt and copy it to your flashdrive.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

On Vista or Windows 7: Now please enter System Recovery Options. (as you did before)

Run FRST64 or FRST (which ever one you're using) and press the Fix button just once and wait.

The tool will make a log on the flashdrive (Fixlog.txt) please post it to your reply.

See if the computer boots normally now and if so..........run MBAR

If not...rescan with FRST and post the new log

Download Malwarebytes Anti-Rootkit from HERE

  • Unzip the contents to a folder in a convenient location.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
  • Wait while the system shuts down and the cleanup process is performed.
  • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
  • When done, please post the two logs produced they will be in the MBAR folder..... mbar-log.txt and system-log.txt
To attach a log if needed:

Bottom right corner of this page.

reply1.jpg

New window that comes up.

replyer1.jpg

~~~~~~~~~~~~~~~~~~~~~~~

Note:

If no additional threats were found, verify that your system is now running normally, making sure that the following items are functional:

Internet access

Windows Update

Windows Firewall

If there are additional problems with your system, such as any of those listed above or other system issues, then run the fixdamage tool included with Malwarebytes Anti-Rootkit and reboot. It's located in the Plugins folder which is in the MBAR folder.

Just run fixdamage.exe.

Verify that they are now functioning normally.

Then download and run a fresh copy of ComboFix.

MrC

Link to post
Share on other sites

Good......

Lets check your computers security before you go and we have a little cleanup to do also:

Download Security Check by screen317 from HERE or HERE.

  • Save it to your Desktop.
  • Double click SecurityCheck.exe and follow the onscreen instructions inside of the black box.
  • If you get Unsupported operating system. Aborting now, just reboot and try again.
  • A Notepad document should open automatically called checkup.txt.
  • Please Post the contents of that document.
  • Do Not Attach It!!!
MrC
Link to post
Share on other sites

Results of screen317's Security Check version 0.99.77

Windows 7 Service Pack 1 x64 (UAC is enabled)

Internet Explorer 11

``````````````Antivirus/Firewall Check:``````````````

Windows Firewall Enabled!

WMI entry may not exist for antivirus; attempting automatic update.

`````````Anti-malware/Other Utilities Check:`````````

Malwarebytes Anti-Malware version 1.75.0.1300

Java 6 Update 14

Java version out of Date!

Adobe Flash Player 11.9.900.117

Adobe Reader 10.1.7 Adobe Reader out of Date!

Google Chrome 31.0.1650.48

Google Chrome 31.0.1650.57

````````Process Check: objlist.exe by Laurent````````

Malwarebytes' Anti-Malware mbamscheduler.exe

`````````````````System Health check`````````````````

Total Fragmentation on Drive C: 0%

````````````````````End of Log``````````````````````

Link to post
Share on other sites

Out dated programs on the system are vulnerable to malware.
Please update or uninstall them:


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Java™ 6 Update 14 <---please uninstall from your add/remove programs

Java version out of Date! <-------Download and install the latest version (Java™ 7 Update 45) from Here. Uncheck the box to install the Ask toolbar!!! and any other free "stuff".

-------------------------------------

Adobe Reader 10.1.7 Adobe Reader out of Date! <---please check for an update if available or uninstall and download and install Foxit Reader which is less vulnerable to malware and much better than Adobe. Don't install any toolbars that may come with it (ASK Toolbar).

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

A little clean up to do....

Please Uninstall ComboFix: (if you used it)

Press the Windows logo key + R to bring up the "run box"

Copy and paste next command in the field:

ComboFix /uninstall

Make sure there's a space between Combofix and /

cf2.jpg

Then hit enter.
This will uninstall Combofix, delete its related folders and files, hide file extensions, hide the system/hidden files and clears System Restore cache and create new Restore point

(If that doesn't work.....you can simply rename ComboFix.exe to Uninstall.exe and double click it to complete the uninstall or download and run the uninstaller)

---------------------------------

Please download OTC to your desktop. (This will clean up most of the tools and logs)
http://oldtimer.geekstogo.com/OTC.exe

Double-click OTC to run it. (Vista and up users, please right click on OTC and select "Run as an Administrator")
Click on the CleanUp! button and follow the prompts.
(If you get a warning from your firewall or other security programs regarding OTC attempting to contact the Internet, please allow the connection.)
You will be asked to reboot the machine to finish the Cleanup process, choose Yes.
After the reboot all the tools we used should be gone.
Note: Some more recently created tools may not yet be removed by OTC. Feel free to manually delete any tools it leaves behind.

Any other programs or logs you can manually delete.
IE: RogueKiller.exe, RKreport.txt, RK_Quarantine folder, C:\FRST, MBAR, etc....AdwCleaner > just run the program and click uninstall.

Note:
If you used FRST and can't delete the quarantine folder:
Download the fixlist.txt to the same folder as FRST.exe.
Run FRST.exe and click Fix only once and wait
That will delete the quarantine folder created by FRST.
The rest you can manually delete.

-------------------------------

Any questions...please post back.

If you think I've helped you, please leave a comment > click on my avatar picture > click Profile Feed.

Take a look at My Preventive Maintenance to avoid being infected again.


Good Luck and Thanks for using the forum, MrC

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.