Jump to content

Infected Flash twice


RVK
 Share

Recommended Posts

Hello

 

I have encountered a strange problem and not sure i am infected or Not

 

2 months back I found my cpu usage 100% even though the system was idle. The task manager showed  an unknown process named idmcache.exe consuming high amounts of cpu cycles. I have Internet download manager installed(idm) but this process is totally unknown to me. On searching the Internet , I found it to be a malware:

 

http://greatis.com/blog/how-to-remove-malware/idmcache-exe.htm

 

I have eset smart security and Malwarebytes which both failed to detect this. I used Unhackme to get rid of it.

 

The malware apparently affects the flash player

%APPDATA%\ADOBE\FLASH PLAYER\BROWSERCACHE\IDMCACHE.EXE

%APPDATA%\ADOBE\FLASH PLAYER\BROWSERCACHE\IDMCACHE.VBS

%APPDATA%\ADOBE\FLASH PLAYER\BROWSERCACHE\IDMCACHE.BAT

I had flash player 11 back then which I updated to the latest version after uninstalling flashplayer 11 and removing leftover files in Users>appdata

Since then I have been using Hitman pro scan weekly and after 3 weeks it detected spd.exe as malware in the %APPDATA%\ADOBE\FLASH PLAYER\SPEEDCACHE\SPD.EXE folder

Hitman removed it sucessfully,but 2 days back I downloaded a portableapps installer file paf and when i clicked to install it malwarebyted showed me Libcurl.dll Trojan.miner Quarantined threat warning.

After a full scan I rebooted my computer only to find a message 'Libcurl.dll not found idmcache.exe failed to start'

Upon checking the Flash player folder under users>appdata I found the idmcache.exe and related files again.

I followed the same procedure full scans of malwarebytes with Hitman pro anf then removal with unhack me which found additional malware in c:\windows\system32\imofugc.sys

Uninstalled flash player removed leftovers and installed again.

The folders and files created by the malware are not there now.

Apparently malwarebytes updated its database to detect this malware recently but still idmcache.exe and related files are not in its database.

I am not sure if i am still infected or this is some latest malware , everything seems ok now.

I have attached the dds logs as specified in the removal guidelines.

 

dds.txt

attach.txt

Link to post
Share on other sites

Hi there,
my name is Marius and I will assist you with your malware related problems.

Before we move on, please read the following points carefully.

  • First, read my instructions completely. If there is anything that you do not understand kindly ask before proceeding.
  • Perform everything in the correct order. Sometimes one step requires the previous one.
  • If you have any problems while following my instructions, Stop there and tell me the exact nature of your problem.
  • Do not run any other scans without instruction or add/remove software unless I tell you to do so. This would change the output of our tools and could be confusing for me.
  • Post all logfiles as a reply rather than as an attachment unless I specifically ask you. If you can not post all logfiles in one reply, feel free to use more posts.
  • If I don't hear from you within 3 days from this initial or any subsequent post, then this thread will be closed.
  • Stay with me. I will give you some advice about prevention after the cleanup process. Absence of symptoms does not always mean the computer is clean.
  • My first language is not english. So please do not use slang or idioms. It could be hard for me to read. Thanks for your understanding.

 
 
 
Scan with Gmer rootkit scanner

Please download Gmer from here by clicking on the "Download EXE" Button.
  • Double click on the randomly named GMER.exe. If asked to allow gmer.sys driver to load, please consent.
  • If it gives you a warning about rootkit activity and asks if you want to run scan...click on NO.
  • In the right panel, you will see several boxes that have been checked. Uncheck the following ...
    • Sections
    • IAT/EAT
    • Show All ( should be unchecked by default )

    [*]Leave everything else as it is. [*]Close all other running programs as well as your Browser. [*]Click the Scan button & wait for it to finish. [*]Once done click on the Save.. button, and in the File name area, type in "ark.txt" or it will save as a .log file which cannot be uploaded to your post. [*]Save it where you can easily find it, such as your desktop. [*]Please post the content of the ark.txt here.


**Caution**
Rootkit scans often produce false positives. Do NOT take any action on any "<--- ROOKIT" entries

Link to post
Share on other sites

Hi Marius , thanks for replying so soon.

 

I am pasting the contents of the ark.txt generated from the GMER quick scan as you asked :

 

GMER 2.1.19357 - http://www.gmer.net
Rootkit scan 2014-04-02 02:25:29
Windows 6.1.7601 Service Pack 1 \Device\Harddisk0\DR0 -> \Device\Ide\IdeDeviceP0T0L0-0 TOSHIBA_MQ01ABD032 rev.AX001A 298.09GB
Running: uko1l7tc.exe; Driver: C:\Users\R\AppData\Local\Temp\pxldrpog.sys
 
 
---- System - GMER 2.1 ----
 
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwAddBootEntry [0x8C8F54FE]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwAlpcConnectPort [0x8C8F5A60]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwAlpcSendWaitReceivePort [0x8C8F7C14]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwConnectPort [0x8C8F6C32]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwCreateSection [0x8C8F68B2]
SSDT    \SystemRoot\system32\DRIVERS\ehdrv.sys                                                                                                          ZwCreateThread [0x8C9D2F80]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwCreateThreadEx [0x8C8F5EC6]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwDeleteBootEntry [0x8C8F556A]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwDeleteFile [0x8C8F5C38]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwDeviceIoControlFile [0x8C8F4E3E]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwDuplicateObject [0x8C8F51A2]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwFsControlFile [0x8C8F5BD8]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwImpersonateClientOfPort [0x8C8F5B9E]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwImpersonateThread [0x8C8F5B5C]
SSDT    \SystemRoot\system32\DRIVERS\ehdrv.sys                                                                                                          ZwLoadDriver [0x8C9D3040]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwMapViewOfSection [0x8C8F75A2]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwModifyBootEntry [0x8C8F5534]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwOpenProcess [0x8C8F6A40]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwOpenSection [0x8C8F6438]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwOpenThread [0x8C8F6B26]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwProtectVirtualMemory [0x8C8F64FC]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwQueueApcThread [0x8C8F4EFC]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwReplaceKey [0x8C8F568C]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwRequestWaitReplyPort [0x8C8F7AE4]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwRestoreKey [0x8C8F55D6]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwSecureConnectPort [0x8C8F6D1C]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwSetBootOptions [0x8C8F55A0]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwSetContextThread [0x8C8F4F60]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwSetInformationFile [0x8C8F5C9C]
SSDT    \SystemRoot\system32\DRIVERS\ehdrv.sys                                                                                                          ZwSetSystemInformation [0x8C9D3000]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwShutdownSystem [0x8C8F54B6]
SSDT    \SystemRoot\system32\DRIVERS\ehdrv.sys                                                                                                          ZwSystemDebugControl [0x8C9D2FC0]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwTerminateProcess [0x8C8ED000]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwTerminateThread [0x8C8ED023]
SSDT    \??\C:\Program Files\SpyShelter Personal Free\SpyShelter.sys                                                                                    ZwWriteVirtualMemory [0x8C8F77F8]
 
---- Devices - GMER 2.1 ----
 
Device  \Driver\BTHUSB \Device\0000008e                                                                                                                 bthport.sys
 
---- Threads - GMER 2.1 ----
 
Thread  System [4:796]                                                                                                                                  87643E90
 
---- Registry - GMER 2.1 ----
 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}                                 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}@oajckabhnnkbideamojcnidgnkhggo  0x69 0x61 0x6A 0x68 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}@napcicofmiojnjfekbgjoickdocn    0x69 0x61 0x6A 0x68 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}@handmpidobhmphae                0x64 0x62 0x68 0x65 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}@gandmpidlbendf                  0x6F 0x61 0x66 0x63 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{3B0B4D0C-AD08-A6C3-446E-91D04033ADAB}                                 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{3B0B4D0C-AD08-A6C3-446E-91D04033ADAB}@jaonlfppjbicilcimpch            0x64 0x62 0x6D 0x6F ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{61FBAC5B-8BE1-ED45-0FC7-1B08A7E25B50}                                 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{61FBAC5B-8BE1-ED45-0FC7-1B08A7E25B50}@iaickoceiebejphnjc              0x69 0x61 0x62 0x69 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{61FBAC5B-8BE1-ED45-0FC7-1B08A7E25B50}@hacbimogbdfjjcjp                0x69 0x61 0x62 0x69 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A090CF22-0430-F8AB-E9A1-7377EDD82557}                                 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A090CF22-0430-F8AB-E9A1-7377EDD82557}@hanodfedhchcckea                0x61 0x62 0x61 0x6D ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A090CF22-0430-F8AB-E9A1-7377EDD82557}@jamoohopkkjeomgbiedp            0x64 0x62 0x6B 0x6F ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}                                 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}@jalikbblohecbmghifgm            0x62 0x61 0x6F 0x63 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}@jalikbblohecbmghifkm            0x62 0x61 0x6F 0x63 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}@ialhgjikmbgifdkmlf              0x6B 0x61 0x6D 0x63 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}@habhmomcbpkoajpa                0x6B 0x61 0x6D 0x63 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}                                 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}@iadhjhjhhihpjhdnle              0x6B 0x61 0x67 0x64 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}@hanfljhlobpdlchp                0x6B 0x61 0x67 0x64 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}@dakifghc                        0x61 0x62 0x61 0x69 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}@dakinajg                        0x61 0x61 0x00 0x69 
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}@dakibple                        0x69 0x62 0x6A 0x64 ...
Reg     HKCU\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}@dakicpfe                        0x66 0x62 0x65 0x66 ...
 
---- EOF - GMER 2.1 ----
Link to post
Share on other sites

Combofix

Combofix should only be run when adviced by a team member!

Link


Important - Save the file to your desktop!


  • Deactivate any and all of your antivirus programs /spyware scanners - they can prevent CF from doing its work.
  • Run Combofix.exe



When finished, Combofix creates a log file named C:\Combofix.txt. Please post its content in your next reply.

Note: When receiving an error message containing ""Illegal operation attempted on a registry key that has been marked for deletion" simply restart your computer to fix this.

Link to post
Share on other sites

Hi again

 

I ran combofix but encountered a few problems like Combofix.exe downloaded from the link said It had expired and it can run in limited functionality. I downloaded the exe again bleeping computers website and again got the same message. I decided to run it anyways. I think i forgot to disbale windows defender rest all scanners were disabled.

 

Here is the log :

 

ComboFix 14-03-24.01 - R 02-04-2014  17:26:49.2.2 - x86
Microsoft Windows 7 Ultimate   6.1.7601.1.1252.91.1033.18.2009.1090 [GMT 5.5:30]
Running from: c:\users\R\Downloads\Programs\ComboFix.exe
AV: ESET Smart Security 7.0 *Disabled/Updated* {19259FAE-8396-A113-46DB-15B0E7DFA289}
FW: ESET Personal firewall *Disabled* {211E1E8B-C9F9-A04B-6D84-BC85190CE5F2}
SP: ESET Smart Security 7.0 *Disabled/Updated* {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834}
SP: Spybot - Search and Destroy *Disabled/Updated* {9BC38DF1-3CCA-732D-A930-C1CA5F20A4B0}
SP: Windows Defender *Enabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
- REDUCED FUNCTIONALITY MODE -
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\windows\system32\ijl11.dll
c:\windows\wininit.ini
c:\windows\wpe pro.INI
.
.
(((((((((((((((((((((((((   Files Created from 2014-03-02 to 2014-04-02  )))))))))))))))))))))))))))))))
.
.
2014-04-02 11:59 . 2014-04-02 11:59 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\users\R\AppData\Local\Currach Software
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\program files\Currach Software
2014-03-31 16:16 . 2014-03-31 16:16 2 --shatr- c:\windows\winstart.bat
2014-03-30 06:29 . 2014-03-31 19:01 12872 ----a-w- c:\windows\system32\bootdelete.exe
2014-03-30 06:06 . 2014-03-30 14:00 -------- d-----w- c:\program files\HitmanPro
2014-03-30 06:05 . 2014-03-30 06:31 -------- d-----w- c:\programdata\HitmanPro
2014-03-29 13:17 . 2014-03-31 19:48 -------- d-----w- c:\users\R\AppData\Roaming\QuickScan
2014-03-27 15:33 . 2014-03-27 15:33 -------- d-----w- c:\programdata\CyberLink
2014-03-27 07:32 . 2014-03-27 14:32 -------- d-----w- c:\program files\softendo.com
2014-03-26 16:19 . 2014-03-26 16:19 62576 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\offreg.dll
2014-03-26 16:17 . 2014-03-17 04:46 7969936 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\mpengine.dll
2014-03-26 01:31 . 2013-09-20 05:19 18968 ----a-w- c:\windows\system32\sdnclean.exe
2014-03-26 01:31 . 2014-03-27 04:55 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2014-03-26 01:30 . 2014-03-26 01:36 -------- d-----w- c:\program files\Spybot - Search & Destroy 2
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\users\R\AppData\Local\SoftConstructors
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\program files\SoftConstructors
2014-03-25 08:59 . 2014-04-02 10:36 -------- d-----w- c:\program files\TimeBell
2014-03-25 04:45 . 2014-03-31 15:08 75480 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-03-25 02:34 . 2014-03-25 02:34 -------- d-----w- c:\users\R\AppData\Local\ElevatedDiagnostics
2014-03-24 12:47 . 2014-03-24 12:47 -------- d-----w- c:\users\R\AppData\Roaming\Malwarebytes
2014-03-24 12:47 . 2014-03-24 12:47 -------- d-----w- c:\programdata\Malwarebytes
2014-03-24 12:47 . 2014-03-24 12:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2014-03-24 12:47 . 2013-04-04 09:20 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-03-21 13:42 . 2014-03-21 18:41 -------- d-----w- c:\users\R\AppData\Roaming\Mipony
2014-03-20 12:20 . 2013-11-28 00:24 108000 ----a-w- c:\windows\system32\drivers\idmwfp.sys
2014-03-19 13:08 . 2014-04-01 20:15 -------- d-----w- c:\users\R\AppData\Local\CrashDumps
2014-03-19 03:20 . 2013-05-22 14:33 33080 ----a-w- c:\windows\system32\SpyShelterShellExt.dll
2014-03-19 03:20 . 2014-02-08 07:51 3397120 ----a-w- c:\windows\system32\Osklauncher.exe
2014-03-19 03:20 . 2012-10-22 12:51 54784 ----a-w- c:\windows\system32\inject_logon_dll.dll
2014-03-19 03:20 . 2014-03-22 23:44 -------- d-----w- c:\users\R\AppData\Roaming\SpyShelter
2014-03-19 03:20 . 2014-03-19 03:20 -------- d-----w- c:\program files\SpyShelter Personal Free
2014-03-19 02:38 . 2014-03-19 02:38 -------- d-----w- c:\users\R\AppData\Local\Zemana
2014-03-18 08:06 . 2002-11-26 09:06 10752 ----a-w- c:\windows\system32\hh.exe
2014-03-18 08:06 . 2001-04-05 12:13 1009336 ----a-w- c:\windows\system32\mschrt20.ocx
2014-03-18 08:06 . 2014-03-18 08:06 -------- d-----w- c:\program files\Kiran's Typing Tutor
2014-03-18 06:43 . 2014-03-18 06:43 -------- d-----w- c:\program files\TypeFaster
2014-03-16 04:18 . 2014-03-16 04:18 -------- d-----w- c:\program files\ESET
2014-03-16 02:31 . 2014-03-16 02:31 -------- d-----w- c:\users\R\AppData\Roaming\CrystalIdea Software
2014-03-16 01:57 . 2014-03-16 03:17 -------- d-----w- c:\windows\system32\wbem\REP.OLD
2014-03-15 07:38 . 2014-03-15 07:38 -------- d-----w- c:\users\Default\AppData\Roaming\TuneUp Software
2014-03-15 06:51 . 2014-03-15 06:51 -------- d-----w- c:\users\R\AppData\Roaming\TuneUp Software
2014-03-12 08:30 . 2014-03-12 08:30 -------- d-----w- c:\program files\Java2
2014-03-09 17:53 . 2014-03-29 12:21 -------- d-----w- c:\program files\PhotoInstrument
2014-03-08 13:22 . 2014-03-08 13:22 -------- d-----w- c:\program files\SoftMaker FreeOffice
2014-03-08 04:10 . 2014-03-08 04:45 -------- d-----w- c:\windows\AF54923662584AC6A0435B5B89C6EB61.TMP
2014-03-08 04:10 . 2014-03-08 04:10 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2014-03-07 03:48 . 2014-03-24 06:58 -------- d-----w- c:\program files\Dobermann
2014-03-05 07:06 . 2014-03-05 07:06 -------- d-----w- c:\program files\PF Auto-Typer
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-03-31 19:12 . 2013-01-13 17:37 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-03-31 19:12 . 2013-01-13 17:37 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-02-06 19:20 . 2014-02-16 02:30 33608 ----a-w- c:\windows\system32\drivers\tap0901.sys
2014-01-13 01:04 . 2013-12-09 07:33 286720 ------w- c:\windows\Setup1.exe
2014-01-13 01:04 . 2013-12-09 07:33 73216 ----a-w- c:\windows\ST6UNST.EXE
2014-01-13 00:51 . 2014-01-13 00:51 75776 ----a-w- c:\windows\system32\temp.001
2014-01-13 00:43 . 2014-01-13 00:43 75776 ----a-w- c:\windows\system32\temp.000
2014-01-06 19:23 . 2014-01-06 19:23 4558848 ----a-w- c:\windows\system32\GPhotos.scr
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\IDM Shell Extension]
@="{CDC95B92-E27C-4745-A8C5-64A52A78855D}"
[HKEY_CLASSES_ROOT\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}]
2012-11-15 23:07 21904 ----a-w- c:\program files\Internet Download Manager\IDMShellExt.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Ditto"="c:\users\R\Desktop\ditto\DittoPortable\App\Ditto\Ditto.exe" [2012-11-09 1433200]
"IDMan"="c:\program files\Internet Download Manager\IDMan.exe" [2014-03-31 3829328]
"SpyShelter"="c:\program files\SpyShelter Personal Free\SpyShelter.exe" [2014-02-13 5058912]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-11-13 173600]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-11-13 138784]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-11-13 172064]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RtHDVCpl.exe" [2009-09-22 7739936]
"egui"="c:\program files\ESET\ESET Smart Security\egui.exe" [2013-09-12 5110672]
"SDTray"="c:\program files\Spybot - Search & Destroy 2\SDTray.exe" [2013-07-25 5624784]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"<NO NAME>"= 014
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"DisableThumbnails"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37Crusader]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37CrusaderBoot]
@=""
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^FileBox eXtender.lnk]
backup=c:\windows\pss\FileBox eXtender.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^MultiClipBoard.lnk]
backup=c:\windows\pss\MultiClipBoard.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Dropbox.lnk]
backup=c:\windows\pss\Dropbox.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^LetMeType.lnk]
backup=c:\windows\pss\LetMeType.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^QClip.lnk]
backup=c:\windows\pss\QClip.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Spartan.lnk]
backup=c:\windows\pss\Spartan.lnk.Startup
backupExtension=.Startup
HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\SunJavaUpdateSched
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2013-04-04 21:06 958576 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2012-12-19 14:39 41208 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FlashGet 3]
2013-04-18 01:23 3377256 ----a-w- c:\program files\FlashGet Network\FlashGet 3\FlashGet3.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2013-02-18 17:43 116648 ----atw- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
2013-11-14 11:12 20584608 ----a-r- c:\program files\Skype\Phone\Skype.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Wondershare Helper Compact.exe]
2013-12-18 06:13 1980416 ----a-w- c:\program files\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe
.
R2 HWDeviceService.exe;HWDeviceService.exe;c:\programdata\DatacardService\HWDeviceService.exe [2010-11-16 264704]
R2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes' Anti-Malware\mbamscheduler.exe [2013-04-04 418376]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [2013-04-04 701512]
R2 SDScannerService;Spybot-S&D 2 Scanner Service;c:\program files\Spybot - Search & Destroy 2\SDFSSvc.exe [2013-10-15 3921880]
R2 SDUpdateService;Spybot-S&D 2 Updating Service;c:\program files\Spybot - Search & Destroy 2\SDUpdSvc.exe [2013-09-20 1042272]
R2 SDWSCService;Spybot-S&D 2 Security Center Service;c:\program files\Spybot - Search & Destroy 2\SDWSCSvc.exe [2013-09-13 171416]
R2 WiseBootAssistant;Wise Boot Assistant;c:\program files\Wise\Wise Care 365\BootTime.exe [2013-12-09 580232]
R3 DigiartyVirtualCDBus;Digiarty Virtual Driver;c:\windows\system32\drivers\DigiartyVirtualCDBus.sys [2013-04-02 163616]
R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [2010-11-20 62464]
R3 esgiguard;esgiguard;c:\users\R\AppData\Local\Temp\RarSFX0\esgiguard.sys [x]
R3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\DRIVERS\ew_hwusbdev.sys [2013-01-12 102784]
R3 ManyCam;ManyCam Virtual Webcam;c:\windows\system32\DRIVERS\mcvidrv.sys [2012-10-11 34432]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2013-04-04 22856]
R3 mcaudrv_simple;ManyCam Virtual Microphone;c:\windows\system32\drivers\mcaudrv.sys [2013-01-31 22656]
R3 MFE_RR;MFE_RR;c:\users\R\AppData\Local\Temp\mfe_rr.sys [x]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2010-11-20 15872]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2010-07-01 34896]
R3 SEE;SoftEther Ethernet Layer Driver;c:\windows\system32\drivers\see.sys [2013-11-24 42976]
R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys [2010-11-20 77184]
R3 terminpt;Microsoft Remote Desktop Input Driver;c:\windows\system32\drivers\terminpt.sys [2010-11-20 25600]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 52224]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-20 27264]
R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys [2010-11-20 112640]
R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys [x]
R4 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [2013-10-23 172192]
S0 epfwwfp;epfwwfp;c:\windows\system32\DRIVERS\epfwwfp.sys [2013-09-17 49240]
S1 eamonm;eamonm;c:\windows\system32\DRIVERS\eamonm.sys [2013-09-17 188808]
S1 ehdrv;ehdrv;c:\windows\system32\DRIVERS\ehdrv.sys [2013-09-17 134248]
S1 EpfwLWF;Epfw NDIS LightWeight Filter;c:\windows\system32\DRIVERS\EpfwLWF.sys [2013-09-17 37416]
S1 SABI;SAMSUNG Kernel Driver For Windows 7;c:\windows\system32\Drivers\SABI.sys [2009-05-28 10752]
S1 Spyshelter;Spyshelter;c:\program files\SpyShelter Personal Free\SpyShelter.sys [2014-02-13 358240]
S2 ekrn;ESET Service;c:\program files\ESET\ESET Smart Security\ekrn.exe [2013-09-12 1337752]
S2 IDMWFP;IDMWFP;c:\windows\system32\DRIVERS\idmwfp.sys [2013-11-28 108000]
S2 WCMVCAM;WebcamMax, WDM Video Capture;c:\windows\system32\DRIVERS\wcmvcam.sys [2012-04-15 1068216]
S3 huawei_enumerator;huawei_enumerator;c:\windows\system32\DRIVERS\ew_jubusenum.sys [2013-01-12 73216]
S3 SafeIPS;SafeIPS;c:\program files\SafeIP\SafeIPs.exe [2013-06-28 3860480]
S3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\DRIVERS\vcsvad.sys [2008-12-26 17792]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x86.sys [2009-07-13 311296]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-03-15 17:23 1150280 ----a-w- c:\program files\Google\Chrome\Application\33.0.1750.154\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-04-02 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-02 c:\windows\Tasks\GoogleUpdateTaskMachineUA1ce7c259d6f70f7.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-01 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000Core.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000UA1ce482131e04cee.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-02 c:\windows\Tasks\Wise Care 365.job
- c:\program files\Wise\Wise Care 365\WiseTray.exe [2013-05-31 09:08]
.
2014-03-21 c:\windows\Tasks\Wise Turbo Checker.job
- c:\program files\Wise\Wise Care 365\WiseTurbo.exe [2013-05-31 09:08]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = <-loopback>
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Download all links by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallurl.htm
IE: Download all links with IDM - c:\program files\Internet Download Manager\IEGetAll.htm
IE: Download all videos by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallflvurl.htm
IE: Download by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgeturl.htm
IE: Download current video by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetflvurl.htm
IE: Download with IDM - c:\program files\Internet Download Manager\IEExt.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105
LSP: c:\windows\system32\SafeIPs.dll
Trusted Zone: parachat.com\chat
.
- - - - ORPHANS REMOVED - - - -
.
ShellExecuteHooks-{5AE067D3-9AFB-48E0-853A-EBB7F4A000DA} - (no file)
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{0055C089-8582-441B-A0BF-17B458C2A3A8}"=hex:51,66,7a,6c,4c,1d,38,12,e7,c3,46,
   04,b0,cb,75,01,df,a9,54,f4,5d,9c,e7,bc
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
   1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{72853161-30C5-4D22-B7F9-0BBC1D38A37E}"=hex:51,66,7a,6c,4c,1d,38,12,0f,32,96,
   76,f7,7e,4c,08,c8,ef,48,fc,18,66,e7,6a
"{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}"=hex:51,66,7a,6c,4c,1d,38,12,d5,94,07,
   72,c2,98,42,03,c9,fd,97,9a,f4,87,69,57
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
   df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}"=hex:51,66,7a,6c,4c,1d,38,12,8f,19,47,
   2e,c4,15,0b,03,d7,b5,8c,e9,62,70,06,85
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
   fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
   b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:79,0a,1a,3d,03,c0,ce,01
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\User Preferences]
@Denied: (2) (LocalSystem)
"88D7D0879DAB32E14DE5B3A805A34F98AFF34F5977"=hex:01,00,00,00,d0,8c,9d,df,01,15,
   d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,dd,77,b0,50,eb,de,01,4e,84,05,8e,\
"2D53CFFC5C1A3DD2E97B7979AC2A92BD59BC839E81"=hex:01,00,00,00,d0,8c,9d,df,01,15,
   d1,11,8c,7a,00,c0,4f,c2,97,eb,01,00,00,00,dd,77,b0,50,eb,de,01,4e,84,05,8e,\
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}*]
@Allowed: (Read) (RestrictedCode)
"oajckabhnnkbideamojcnidgnkhggo"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"napcicofmiojnjfekbgjoickdocn"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"handmpidobhmphae"=hex:64,62,68,65,65,6e,6e,62,61,70,6e,6e,66,64,68,70,6c,6b,
   63,62,67,6c,68,6f,6c,6d,6a,70,6c,70,6c,70,65,68,68,69,61,70,67,66,00,f5
"gandmpidlbendf"=hex:6f,61,66,63,69,62,63,6d,63,6e,70,6a,67,61,66,63,63,67,6b,
   6c,70,62,66,6e,65,67,6b,63,6f,69,00,70
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{3B0B4D0C-AD08-A6C3-446E-91D04033ADAB}*]
@Allowed: (Read) (RestrictedCode)
"jaonlfppjbicilcimpch"=hex:64,62,6d,6f,66,65,69,63,6a,69,6d,67,61,6d,6d,63,63,
   63,6e,6f,70,65,6e,6b,61,66,6c,6d,6f,69,66,69,6c,63,65,67,68,6d,70,68,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{61FBAC5B-8BE1-ED45-0FC7-1B08A7E25B50}*]
@Allowed: (Read) (RestrictedCode)
"iaickoceiebejphnjc"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
"hacbimogbdfjjcjp"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A090CF22-0430-F8AB-E9A1-7377EDD82557}*]
"hanodfedhchcckea"=hex:61,62,61,6d,6f,6c,6a,6c,6f,70,6d,64,69,67,6b,69,6a,6c,
   63,6a,64,6d,62,69,69,6f,6c,6f,63,6c,67,6d,67,6b,00,74
"jamoohopkkjeomgbiedp"=hex:64,62,6b,6f,6b,6c,68,6e,6c,6a,6f,6b,67,64,6f,65,62,
   63,6c,65,64,6d,6e,69,70,6c,69,6a,64,70,6d,66,68,6c,65,67,64,65,67,6c,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}*]
"jalikbblohecbmghifgm"=hex:62,61,6f,63,00,00
"jalikbblohecbmghifkm"=hex:62,61,6f,63,00,00
"ialhgjikmbgifdkmlf"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
"habhmomcbpkoajpa"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}*]
@Allowed: (Read) (RestrictedCode)
"iadhjhjhhihpjhdnle"=hex:6b,61,67,64,69,6f,69,6c,6f,6b,65,68,62,6a,6d,6b,6c,6d,
   63,63,70,6c,00,00
"hanfljhlobpdlchp"=hex:6b,61,67,64,6d,6f,65,6d,64,67,67,6b,70,62,6f,68,6a,61,
   66,70,62,6f,00,00
"dakifghc"=hex:61,62,61,69,61,63,62,66,69,61,6b,62,68,62,65,6f,6c,6d,67,65,6a,
   68,6b,66,69,61,6e,67,62,68,6c,6f,62,69,00,00
"dakinajg"=hex:61,61,00,69
"dakibple"=hex:69,62,6a,64,6d,68,67,61,6d,65,62,62,64,6b,61,6e,66,66,65,66,66,
   6e,69,6f,6f,62,62,67,6f,6e,6e,6d,6f,62,6f,70,6a,70,70,6b,61,61,6c,6e,63,62,\
"dakicpfe"=hex:66,62,65,66,64,64,6a,63,65,6b,6e,67,64,70,6f,69,64,70,63,6d,61,
   68,69,6c,62,6d,65,66,6e,6e,6a,65,70,6f,6e,62,6a,6e,6d,62,6f,6b,61,6a,00,62
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000_Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"scansk"=hex(0):d2,e9,a6,f1,39,a1,3c,94,66,59,4f,ee,57,35,db,a7,91,ba,3f,64,04,
   42,ff,27,6a,f8,ff,43,1b,cd,40,49,2f,77,2f,f3,36,5a,15,2e,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000_Classes\CLSID\{61d52359-b994-4890-a5a4-e4cf2609c012}]
@Denied: (Full) (Everyone)
@Allowed: (Read) (RestrictedCode)
"Model"=dword:00000160
"Therad"=dword:0000002a
"MData"=hex(0):2b,8f,78,29,5a,0c,ce,ec,48,d4,68,e5,9f,6a,96,3e,ab,de,c5,81,26,
   38,95,44,75,07,18,dd,fb,11,42,94,27,b7,99,0d,2a,ba,05,1a,a2,02,c9,3e,9b,f9,\
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2014-04-02  17:31:44
ComboFix-quarantined-files.txt  2014-04-02 12:01
.
Pre-Run: 50,439,376,896 bytes free
Post-Run: 50,138,677,248 bytes free
.
- - End Of File - - 61455C73155BFD8CAC88082028082999
A36C5E4F47E84449FF07ED3517B43A31
Link to post
Share on other sites

I have no idea what that is because I didnt create it.

 

Hitman Pro cleans malware before windows starts/ Unhack me also installs boot time scans but I have unhack me uninstalled.

 

Other than that I have no idea what that file could be.

 

-RVK

Link to post
Share on other sites

Combofix scripting

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Download the attached CFScript.txt and save it to the location where Combofix is saved to.


CFScriptB-4.gif


Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

 

 

 

Full System Scan with Malwarebytes Antimalware
 

  • If not existing, please download Malwarebytes Anti-Malware to your desktop.
  • Double-click mbam-setup-2.0.0.1000.exe and follow the prompts to install the program.
  • At the end, be sure a checkmark is placed next to the following:
    • Launch Malwarebytes Anti-Malware
    • A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.
  • Click Finish.

If the program is already installed:

  • Run Malwarebytes Antimalware
  • On the Dashboard, click the 'Update Now >>' link
  • After the update completes, click the 'Scan Now >>' button.
  • Or, on the Dashboard, click the Scan Now >> button.
  • If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.
  • In most cases, a restart will be required.
  • Wait for the prompt to restart the computer to appear, then click on Yes.

  • After the restart once you are back at your desktop, open MBAM once more.
  • Click on the History tab > Application Logs.
  • Double click on the scan log which shows the Date and time of the scan just performed.
  • Click 'Copy to Clipboard'
  • Paste the contents of the clipboard into your reply.

 

CFScript.txt

Link to post
Share on other sites

Hi

Ok done. Combofix took 2 hours to finish.  Since the first when I ran it where it detected winstart.bat  I  cant use the shut down or restart option in start menu > any fixes for those? I use ctrl-alt-del to shut down the windows now .

 

Here are logs from CF and MBAM :

 

ComboFix 14-04-03.01 - R 03-04-2014  16:25:54.3.2 - x86
Microsoft Windows 7 Ultimate   6.1.7601.1.1252.91.1033.18.2009.1142 [GMT 5.5:30]
Running from: c:\users\R\Downloads\Programs\ComboFix.exe
Command switches used :: c:\users\R\Downloads\Programs\CFScript.txt
AV: ESET Smart Security 7.0 *Disabled/Updated* {19259FAE-8396-A113-46DB-15B0E7DFA289}
FW: ESET Personal firewall *Disabled* {211E1E8B-C9F9-A04B-6D84-BC85190CE5F2}
SP: ESET Smart Security 7.0 *Disabled/Updated* {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834}
SP: Spybot - Search and Destroy *Disabled/Updated* {9BC38DF1-3CCA-732D-A930-C1CA5F20A4B0}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\programdata\V21.dll
c:\users\R\AppData\Roaming\9961660784cc2937229a742.95731288
c:\users\R\AppData\Roaming\WebcamMax-7.7.7.2.MultiLanguage.Setup.exe
c:\windows\wininit.ini
.
.
(((((((((((((((((((((((((   Files Created from 2014-03-03 to 2014-04-03  )))))))))))))))))))))))))))))))
.
.
2014-04-03 12:48 . 2014-04-03 12:48 -------- d-----w- c:\users\R\AppData\Local\temp
2014-04-03 12:48 . 2014-04-03 12:48 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-04-03 06:32 . 2014-04-03 07:06 -------- d-----w- c:\programdata\Malwarebytes' Anti-Malware (portable)
2014-04-03 06:32 . 2014-04-03 06:32 107224 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\users\R\AppData\Local\Currach Software
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\program files\Currach Software
2014-03-31 16:16 . 2014-03-31 16:16 2 --shatr- c:\windows\winstart.bat
2014-03-30 06:29 . 2014-03-31 19:01 12872 ----a-w- c:\windows\system32\bootdelete.exe
2014-03-30 06:06 . 2014-03-30 14:00 -------- d-----w- c:\program files\HitmanPro
2014-03-30 06:05 . 2014-03-30 06:31 -------- d-----w- c:\programdata\HitmanPro
2014-03-29 13:17 . 2014-03-31 19:48 -------- d-----w- c:\users\R\AppData\Roaming\QuickScan
2014-03-27 15:33 . 2014-03-27 15:33 -------- d-----w- c:\programdata\CyberLink
2014-03-27 07:32 . 2014-03-27 14:32 -------- d-----w- c:\program files\softendo.com
2014-03-26 16:19 . 2014-03-26 16:19 62576 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\offreg.dll
2014-03-26 16:17 . 2014-03-17 04:46 7969936 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\mpengine.dll
2014-03-26 01:31 . 2013-09-20 05:19 18968 ----a-w- c:\windows\system32\sdnclean.exe
2014-03-26 01:31 . 2014-03-27 04:55 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2014-03-26 01:30 . 2014-03-26 01:36 -------- d-----w- c:\program files\Spybot - Search & Destroy 2
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\users\R\AppData\Local\SoftConstructors
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\program files\SoftConstructors
2014-03-25 08:59 . 2014-04-02 10:36 -------- d-----w- c:\program files\TimeBell
2014-03-25 04:45 . 2014-04-03 06:23 75480 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-03-25 02:34 . 2014-03-25 02:34 -------- d-----w- c:\users\R\AppData\Local\ElevatedDiagnostics
2014-03-24 12:47 . 2014-03-24 12:47 -------- d-----w- c:\users\R\AppData\Roaming\Malwarebytes
2014-03-24 12:47 . 2014-03-24 12:47 -------- d-----w- c:\programdata\Malwarebytes
2014-03-24 12:47 . 2014-03-24 12:47 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2014-03-24 12:47 . 2013-04-04 09:20 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-03-21 13:42 . 2014-03-21 18:41 -------- d-----w- c:\users\R\AppData\Roaming\Mipony
2014-03-20 12:20 . 2013-11-28 00:24 108000 ----a-w- c:\windows\system32\drivers\idmwfp.sys
2014-03-19 13:08 . 2014-04-03 03:33 -------- d-----w- c:\users\R\AppData\Local\CrashDumps
2014-03-19 03:20 . 2013-05-22 14:33 33080 ----a-w- c:\windows\system32\SpyShelterShellExt.dll
2014-03-19 03:20 . 2014-02-08 07:51 3397120 ----a-w- c:\windows\system32\Osklauncher.exe
2014-03-19 03:20 . 2012-10-22 12:51 54784 ----a-w- c:\windows\system32\inject_logon_dll.dll
2014-03-19 03:20 . 2014-03-22 23:44 -------- d-----w- c:\users\R\AppData\Roaming\SpyShelter
2014-03-19 03:20 . 2014-03-19 03:20 -------- d-----w- c:\program files\SpyShelter Personal Free
2014-03-19 02:38 . 2014-03-19 02:38 -------- d-----w- c:\users\R\AppData\Local\Zemana
2014-03-18 08:06 . 2002-11-26 09:06 10752 ----a-w- c:\windows\system32\hh.exe
2014-03-18 08:06 . 2001-04-05 12:13 1009336 ----a-w- c:\windows\system32\mschrt20.ocx
2014-03-18 08:06 . 2014-03-18 08:06 -------- d-----w- c:\program files\Kiran's Typing Tutor
2014-03-18 06:43 . 2014-03-18 06:43 -------- d-----w- c:\program files\TypeFaster
2014-03-16 04:18 . 2014-03-16 04:18 -------- d-----w- c:\program files\ESET
2014-03-16 02:31 . 2014-03-16 02:31 -------- d-----w- c:\users\R\AppData\Roaming\CrystalIdea Software
2014-03-16 01:57 . 2014-03-16 03:17 -------- d-----w- c:\windows\system32\wbem\REP.OLD
2014-03-15 07:38 . 2014-03-15 07:38 -------- d-----w- c:\users\Default\AppData\Roaming\TuneUp Software
2014-03-15 06:51 . 2014-03-15 06:51 -------- d-----w- c:\users\R\AppData\Roaming\TuneUp Software
2014-03-12 08:30 . 2014-03-12 08:30 -------- d-----w- c:\program files\Java
2014-03-09 17:53 . 2014-03-29 12:21 -------- d-----w- c:\program files\PhotoInstrument
2014-03-08 13:22 . 2014-03-08 13:22 -------- d-----w- c:\program files\SoftMaker FreeOffice
2014-03-08 04:10 . 2014-03-08 04:45 -------- d-----w- c:\windows\AF54923662584AC6A0435B5B89C6EB61.TMP
2014-03-08 04:10 . 2014-03-08 04:10 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2014-03-07 03:48 . 2014-03-24 06:58 -------- d-----w- c:\program files\Dobermann
2014-03-05 07:06 . 2014-03-05 07:06 -------- d-----w- c:\program files\PF Auto-Typer
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-03-31 19:12 . 2013-01-13 17:37 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-03-31 19:12 . 2013-01-13 17:37 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-02-06 19:20 . 2014-02-16 02:30 33608 ----a-w- c:\windows\system32\drivers\tap0901.sys
2014-01-13 01:04 . 2013-12-09 07:33 286720 ------w- c:\windows\Setup1.exe
2014-01-13 01:04 . 2013-12-09 07:33 73216 ----a-w- c:\windows\ST6UNST.EXE
2014-01-13 00:51 . 2014-01-13 00:51 75776 ----a-w- c:\windows\system32\temp.001
2014-01-13 00:43 . 2014-01-13 00:43 75776 ----a-w- c:\windows\system32\temp.000
2014-01-06 19:23 . 2014-01-06 19:23 4558848 ----a-w- c:\windows\system32\GPhotos.scr
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\IDM Shell Extension]
@="{CDC95B92-E27C-4745-A8C5-64A52A78855D}"
[HKEY_CLASSES_ROOT\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}]
2012-11-15 23:07 21904 ----a-w- c:\program files\Internet Download Manager\IDMShellExt.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Ditto"="c:\users\R\Desktop\ditto\DittoPortable\App\Ditto\Ditto.exe" [2012-11-09 1433200]
"IDMan"="c:\program files\Internet Download Manager\IDMan.exe" [2014-03-31 3829328]
"SpyShelter"="c:\program files\SpyShelter Personal Free\SpyShelter.exe" [2014-02-13 5058912]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-11-13 173600]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-11-13 138784]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-11-13 172064]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RtHDVCpl.exe" [2009-09-22 7739936]
"egui"="c:\program files\ESET\ESET Smart Security\egui.exe" [2013-09-12 5110672]
"SDTray"="c:\program files\Spybot - Search & Destroy 2\SDTray.exe" [2013-07-25 5624784]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"<NO NAME>"= 014
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"DisableThumbnails"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37Crusader]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37CrusaderBoot]
@=""
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^FileBox eXtender.lnk]
backup=c:\windows\pss\FileBox eXtender.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^MultiClipBoard.lnk]
backup=c:\windows\pss\MultiClipBoard.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Dropbox.lnk]
backup=c:\windows\pss\Dropbox.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^LetMeType.lnk]
backup=c:\windows\pss\LetMeType.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^QClip.lnk]
backup=c:\windows\pss\QClip.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Spartan.lnk]
backup=c:\windows\pss\Spartan.lnk.Startup
backupExtension=.Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2013-04-04 21:06 958576 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2012-12-19 14:39 41208 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FlashGet 3]
2013-04-18 01:23 3377256 ----a-w- c:\program files\FlashGet Network\FlashGet 3\FlashGet3.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2013-02-18 17:43 116648 ----atw- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
2013-11-14 11:12 20584608 ----a-r- c:\program files\Skype\Phone\Skype.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Wondershare Helper Compact.exe]
2013-12-18 06:13 1980416 ----a-w- c:\program files\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe
.
R2 HWDeviceService.exe;HWDeviceService.exe;c:\programdata\DatacardService\HWDeviceService.exe [2010-11-16 264704]
R2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes' Anti-Malware\mbamscheduler.exe [2013-04-04 418376]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes' Anti-Malware\mbamservice.exe [2013-04-04 701512]
R2 SDScannerService;Spybot-S&D 2 Scanner Service;c:\program files\Spybot - Search & Destroy 2\SDFSSvc.exe [2013-10-15 3921880]
R2 SDUpdateService;Spybot-S&D 2 Updating Service;c:\program files\Spybot - Search & Destroy 2\SDUpdSvc.exe [2013-09-20 1042272]
R2 SDWSCService;Spybot-S&D 2 Security Center Service;c:\program files\Spybot - Search & Destroy 2\SDWSCSvc.exe [2013-09-13 171416]
R2 WiseBootAssistant;Wise Boot Assistant;c:\program files\Wise\Wise Care 365\BootTime.exe [2013-12-09 580232]
R3 DigiartyVirtualCDBus;Digiarty Virtual Driver;c:\windows\system32\drivers\DigiartyVirtualCDBus.sys [2013-04-02 163616]
R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [2010-11-20 62464]
R3 esgiguard;esgiguard;c:\users\R\AppData\Local\Temp\RarSFX0\esgiguard.sys [x]
R3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\DRIVERS\ew_hwusbdev.sys [2013-01-12 102784]
R3 ManyCam;ManyCam Virtual Webcam;c:\windows\system32\DRIVERS\mcvidrv.sys [2012-10-11 34432]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2013-04-04 22856]
R3 mcaudrv_simple;ManyCam Virtual Microphone;c:\windows\system32\drivers\mcaudrv.sys [2013-01-31 22656]
R3 MFE_RR;MFE_RR;c:\users\R\AppData\Local\Temp\mfe_rr.sys [x]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2010-11-20 15872]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2010-07-01 34896]
R3 SEE;SoftEther Ethernet Layer Driver;c:\windows\system32\drivers\see.sys [2013-11-24 42976]
R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys [2010-11-20 77184]
R3 terminpt;Microsoft Remote Desktop Input Driver;c:\windows\system32\drivers\terminpt.sys [2010-11-20 25600]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 52224]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-20 27264]
R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys [2010-11-20 112640]
R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys [x]
R4 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [2013-10-23 172192]
S0 epfwwfp;epfwwfp;c:\windows\system32\DRIVERS\epfwwfp.sys [2013-09-17 49240]
S1 eamonm;eamonm;c:\windows\system32\DRIVERS\eamonm.sys [2013-09-17 188808]
S1 ehdrv;ehdrv;c:\windows\system32\DRIVERS\ehdrv.sys [2013-09-17 134248]
S1 EpfwLWF;Epfw NDIS LightWeight Filter;c:\windows\system32\DRIVERS\EpfwLWF.sys [2013-09-17 37416]
S1 SABI;SAMSUNG Kernel Driver For Windows 7;c:\windows\system32\Drivers\SABI.sys [2009-05-28 10752]
S1 Spyshelter;Spyshelter;c:\program files\SpyShelter Personal Free\SpyShelter.sys [2014-02-13 358240]
S2 ekrn;ESET Service;c:\program files\ESET\ESET Smart Security\ekrn.exe [2013-09-12 1337752]
S2 IDMWFP;IDMWFP;c:\windows\system32\DRIVERS\idmwfp.sys [2013-11-28 108000]
S2 WCMVCAM;WebcamMax, WDM Video Capture;c:\windows\system32\DRIVERS\wcmvcam.sys [2012-04-15 1068216]
S3 huawei_enumerator;huawei_enumerator;c:\windows\system32\DRIVERS\ew_jubusenum.sys [2013-01-12 73216]
S3 SafeIPS;SafeIPS;c:\program files\SafeIP\SafeIPs.exe [2013-06-28 3860480]
S3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\DRIVERS\vcsvad.sys [2008-12-26 17792]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x86.sys [2009-07-13 311296]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-03-15 17:23 1150280 ----a-w- c:\program files\Google\Chrome\Application\33.0.1750.154\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-04-03 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-03 c:\windows\Tasks\GoogleUpdateTaskMachineUA1ce7c259d6f70f7.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-02 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000Core.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-03 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000UA1ce482131e04cee.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-03 c:\windows\Tasks\Wise Care 365.job
- c:\program files\Wise\Wise Care 365\WiseTray.exe [2013-05-31 09:08]
.
2014-03-21 c:\windows\Tasks\Wise Turbo Checker.job
- c:\program files\Wise\Wise Care 365\WiseTurbo.exe [2013-05-31 09:08]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = <-loopback>
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Download all links by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallurl.htm
IE: Download all links with IDM - c:\program files\Internet Download Manager\IEGetAll.htm
IE: Download all videos by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallflvurl.htm
IE: Download by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgeturl.htm
IE: Download current video by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetflvurl.htm
IE: Download with IDM - c:\program files\Internet Download Manager\IEExt.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105
LSP: c:\windows\system32\SafeIPs.dll
Trusted Zone: parachat.com\chat
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{0055C089-8582-441B-A0BF-17B458C2A3A8}"=hex:51,66,7a,6c,4c,1d,38,12,e7,c3,46,
   04,b0,cb,75,01,df,a9,54,f4,5d,9c,e7,bc
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
   1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{72853161-30C5-4D22-B7F9-0BBC1D38A37E}"=hex:51,66,7a,6c,4c,1d,38,12,0f,32,96,
   76,f7,7e,4c,08,c8,ef,48,fc,18,66,e7,6a
"{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}"=hex:51,66,7a,6c,4c,1d,38,12,d5,94,07,
   72,c2,98,42,03,c9,fd,97,9a,f4,87,69,57
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
   df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}"=hex:51,66,7a,6c,4c,1d,38,12,8f,19,47,
   2e,c4,15,0b,03,d7,b5,8c,e9,62,70,06,85
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
   fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
   b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:79,0a,1a,3d,03,c0,ce,01
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}*]
@Allowed: (Read) (RestrictedCode)
"oajckabhnnkbideamojcnidgnkhggo"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"napcicofmiojnjfekbgjoickdocn"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"handmpidobhmphae"=hex:64,62,68,65,65,6e,6e,62,61,70,6e,6e,66,64,68,70,6c,6b,
   63,62,67,6c,68,6f,6c,6d,6a,70,6c,70,6c,70,65,68,68,69,61,70,67,66,00,f5
"gandmpidlbendf"=hex:6f,61,66,63,69,62,63,6d,63,6e,70,6a,67,61,66,63,63,67,6b,
   6c,70,62,66,6e,65,67,6b,63,6f,69,00,70
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{3B0B4D0C-AD08-A6C3-446E-91D04033ADAB}*]
@Allowed: (Read) (RestrictedCode)
"jaonlfppjbicilcimpch"=hex:64,62,6d,6f,66,65,69,63,6a,69,6d,67,61,6d,6d,63,63,
   63,6e,6f,70,65,6e,6b,61,66,6c,6d,6f,69,66,69,6c,63,65,67,68,6d,70,68,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{61FBAC5B-8BE1-ED45-0FC7-1B08A7E25B50}*]
@Allowed: (Read) (RestrictedCode)
"iaickoceiebejphnjc"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
"hacbimogbdfjjcjp"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A090CF22-0430-F8AB-E9A1-7377EDD82557}*]
"hanodfedhchcckea"=hex:61,62,61,6d,6f,6c,6a,6c,6f,70,6d,64,69,67,6b,69,6a,6c,
   63,6a,64,6d,62,69,69,6f,6c,6f,63,6c,67,6d,67,6b,00,74
"jamoohopkkjeomgbiedp"=hex:64,62,6b,6f,6b,6c,68,6e,6c,6a,6f,6b,67,64,6f,65,62,
   63,6c,65,64,6d,6e,69,70,6c,69,6a,64,70,6d,66,68,6c,65,67,64,65,67,6c,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}*]
"jalikbblohecbmghifgm"=hex:62,61,6f,63,00,00
"jalikbblohecbmghifkm"=hex:62,61,6f,63,00,00
"ialhgjikmbgifdkmlf"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
"habhmomcbpkoajpa"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}*]
@Allowed: (Read) (RestrictedCode)
"iadhjhjhhihpjhdnle"=hex:6b,61,67,64,69,6f,69,6c,6f,6b,65,68,62,6a,6d,6b,6c,6d,
   63,63,70,6c,00,00
"hanfljhlobpdlchp"=hex:6b,61,67,64,6d,6f,65,6d,64,67,67,6b,70,62,6f,68,6a,61,
   66,70,62,6f,00,00
"dakifghc"=hex:61,62,61,69,61,63,62,66,69,61,6b,62,68,62,65,6f,6c,6d,67,65,6a,
   68,6b,66,69,61,6e,67,62,68,6c,6f,62,69,00,00
"dakinajg"=hex:61,61,00,69
"dakibple"=hex:69,62,6a,64,6d,68,67,61,6d,65,62,62,64,6b,61,6e,66,66,65,66,66,
   6e,69,6f,6f,62,62,67,6f,6e,6e,6d,6f,62,6f,70,6a,70,70,6b,61,61,6c,6e,63,62,\
"dakicpfe"=hex:66,62,65,66,64,64,6a,63,65,6b,6e,67,64,70,6f,69,64,70,63,6d,61,
   68,69,6c,62,6d,65,66,6e,6e,6a,65,70,6f,6e,62,6a,6e,6d,62,6f,6b,61,6a,00,62
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2014-04-03  18:21:48
ComboFix-quarantined-files.txt  2014-04-03 12:51
ComboFix2.txt  2014-04-02 12:01
.
Pre-Run: 49,987,334,144 bytes free
Post-Run: 49,710,284,800 bytes free
.
- - End Of File - - 8183AB7694BB078C0888EC70F8492D7D
A36C5E4F47E84449FF07ED3517B43A31
 
 
 
Here is the MBAM log file :
 
Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 03-04-2014
Scan Time: 20:14:33
Logfile: 
Administrator: Yes
 
Version: 2.00.0.1000
Malware Database: v2014.04.03.04
Rootkit Database: v2014.03.27.01
License: Premium
Malware Protection: Enabled
Malicious Website Protection: Enabled
Chameleon: Enabled
 
OS: Windows 7 Service Pack 1
CPU: x86
File System: NTFS
User: R
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 229753
Time Elapsed: 24 min, 16 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Disabled
Rootkits: Enabled
Shuriken: Enabled
PUP: Disabled
PUM: Warn
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 0
(No malicious items detected)
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
 
Any way to fix that start menu> shut down option?
Link to post
Share on other sites

We have more work to do here:

 

 

Combofix scripting

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Download the attached CFScript.txt and save it to the location where Combofix is saved to.


CFScriptB-4.gif


Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

CFScript.txt

Link to post
Share on other sites

Hi

 

I ran the CFscript as instructed. It took lesser time than last time.

 

Here is the log :

 

ComboFix 14-04-03.01 - R 04-04-2014  15:35:34.4.2 - x86
Microsoft Windows 7 Ultimate   6.1.7601.1.1252.91.1033.18.2009.1111 [GMT 5.5:30]
Running from: c:\users\R\Downloads\Programs\ComboFix.exe
Command switches used :: c:\users\R\Downloads\Programs\CFScript.txt
AV: ESET Smart Security 7.0 *Disabled/Updated* {19259FAE-8396-A113-46DB-15B0E7DFA289}
FW: ESET Personal firewall *Disabled* {211E1E8B-C9F9-A04B-6D84-BC85190CE5F2}
SP: ESET Smart Security 7.0 *Disabled/Updated* {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834}
SP: Spybot - Search and Destroy *Disabled/Updated* {9BC38DF1-3CCA-732D-A930-C1CA5F20A4B0}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2014-03-04 to 2014-04-04  )))))))))))))))))))))))))))))))
.
.
2014-04-04 12:07 . 2014-04-04 12:07 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-04-03 14:06 . 2014-03-05 03:56 51416 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-04-03 14:06 . 2014-04-03 14:06 -------- d-----w- c:\program files\Malwarebytes Anti-Malware
2014-04-03 12:51 . 2014-04-04 12:07 -------- d-----w- c:\users\R\AppData\Local\temp
2014-04-03 06:32 . 2014-04-03 07:06 -------- d-----w- c:\programdata\Malwarebytes' Anti-Malware (portable)
2014-04-03 06:32 . 2014-04-04 09:59 107736 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\users\R\AppData\Local\Currach Software
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\program files\Currach Software
2014-03-31 16:16 . 2014-03-31 16:16 2 --shatr- c:\windows\winstart.bat
2014-03-30 06:29 . 2014-03-31 19:01 12872 ----a-w- c:\windows\system32\bootdelete.exe
2014-03-30 06:06 . 2014-03-30 14:00 -------- d-----w- c:\program files\HitmanPro
2014-03-30 06:05 . 2014-03-30 06:31 -------- d-----w- c:\programdata\HitmanPro
2014-03-29 13:17 . 2014-03-31 19:48 -------- d-----w- c:\users\R\AppData\Roaming\QuickScan
2014-03-27 15:33 . 2014-03-27 15:33 -------- d-----w- c:\programdata\CyberLink
2014-03-27 07:32 . 2014-03-27 14:32 -------- d-----w- c:\program files\softendo.com
2014-03-26 16:19 . 2014-03-26 16:19 62576 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\offreg.dll
2014-03-26 16:17 . 2014-03-17 04:46 7969936 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\mpengine.dll
2014-03-26 01:31 . 2013-09-20 05:19 18968 ----a-w- c:\windows\system32\sdnclean.exe
2014-03-26 01:31 . 2014-03-27 04:55 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2014-03-26 01:30 . 2014-03-26 01:36 -------- d-----w- c:\program files\Spybot - Search & Destroy 2
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\users\R\AppData\Local\SoftConstructors
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\program files\SoftConstructors
2014-03-25 08:59 . 2014-04-02 10:36 -------- d-----w- c:\program files\TimeBell
2014-03-25 04:45 . 2014-03-05 03:56 73432 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-03-25 02:34 . 2014-03-25 02:34 -------- d-----w- c:\users\R\AppData\Local\ElevatedDiagnostics
2014-03-24 12:47 . 2014-04-03 14:06 -------- d-----w- c:\users\R\AppData\Roaming\Malwarebytes
2014-03-24 12:47 . 2014-04-03 14:06 -------- d-----w- c:\programdata\Malwarebytes
2014-03-24 12:47 . 2014-03-05 03:56 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-03-21 13:42 . 2014-03-21 18:41 -------- d-----w- c:\users\R\AppData\Roaming\Mipony
2014-03-20 12:20 . 2013-11-28 00:24 108000 ----a-w- c:\windows\system32\drivers\idmwfp.sys
2014-03-19 13:08 . 2014-04-03 03:33 -------- d-----w- c:\users\R\AppData\Local\CrashDumps
2014-03-19 03:20 . 2013-05-22 14:33 33080 ----a-w- c:\windows\system32\SpyShelterShellExt.dll
2014-03-19 03:20 . 2014-02-08 07:51 3397120 ----a-w- c:\windows\system32\Osklauncher.exe
2014-03-19 03:20 . 2012-10-22 12:51 54784 ----a-w- c:\windows\system32\inject_logon_dll.dll
2014-03-19 03:20 . 2014-03-22 23:44 -------- d-----w- c:\users\R\AppData\Roaming\SpyShelter
2014-03-19 03:20 . 2014-03-19 03:20 -------- d-----w- c:\program files\SpyShelter Personal Free
2014-03-19 02:38 . 2014-03-19 02:38 -------- d-----w- c:\users\R\AppData\Local\Zemana
2014-03-18 08:06 . 2002-11-26 09:06 10752 ----a-w- c:\windows\system32\hh.exe
2014-03-18 08:06 . 2001-04-05 12:13 1009336 ----a-w- c:\windows\system32\mschrt20.ocx
2014-03-18 08:06 . 2014-03-18 08:06 -------- d-----w- c:\program files\Kiran's Typing Tutor
2014-03-18 06:43 . 2014-03-18 06:43 -------- d-----w- c:\program files\TypeFaster
2014-03-16 04:18 . 2014-03-16 04:18 -------- d-----w- c:\program files\ESET
2014-03-16 02:31 . 2014-03-16 02:31 -------- d-----w- c:\users\R\AppData\Roaming\CrystalIdea Software
2014-03-16 01:57 . 2014-03-16 03:17 -------- d-----w- c:\windows\system32\wbem\REP.OLD
2014-03-15 07:38 . 2014-03-15 07:38 -------- d-----w- c:\users\Default\AppData\Roaming\TuneUp Software
2014-03-15 06:51 . 2014-03-15 06:51 -------- d-----w- c:\users\R\AppData\Roaming\TuneUp Software
2014-03-12 08:30 . 2014-03-12 08:30 -------- d-----w- c:\program files\Java2
2014-03-09 17:53 . 2014-03-29 12:21 -------- d-----w- c:\program files\PhotoInstrument
2014-03-08 13:22 . 2014-03-08 13:22 -------- d-----w- c:\program files\SoftMaker FreeOffice
2014-03-08 04:10 . 2014-03-08 04:45 -------- d-----w- c:\windows\AF54923662584AC6A0435B5B89C6EB61.TMP
2014-03-08 04:10 . 2014-03-08 04:10 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2014-03-07 03:48 . 2014-03-24 06:58 -------- d-----w- c:\program files\Dobermann
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-03-31 19:12 . 2013-01-13 17:37 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-03-31 19:12 . 2013-01-13 17:37 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-02-06 19:20 . 2014-02-16 02:30 33608 ----a-w- c:\windows\system32\drivers\tap0901.sys
2014-01-13 01:04 . 2013-12-09 07:33 286720 ------w- c:\windows\Setup1.exe
2014-01-13 01:04 . 2013-12-09 07:33 73216 ----a-w- c:\windows\ST6UNST.EXE
2014-01-13 00:51 . 2014-01-13 00:51 75776 ----a-w- c:\windows\system32\temp.001
2014-01-13 00:43 . 2014-01-13 00:43 75776 ----a-w- c:\windows\system32\temp.000
2014-01-06 19:23 . 2014-01-06 19:23 4558848 ----a-w- c:\windows\system32\GPhotos.scr
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\IDM Shell Extension]
@="{CDC95B92-E27C-4745-A8C5-64A52A78855D}"
[HKEY_CLASSES_ROOT\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}]
2012-11-15 23:07 21904 ----a-w- c:\program files\Internet Download Manager\IDMShellExt.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Ditto"="c:\users\R\Desktop\ditto\DittoPortable\App\Ditto\Ditto.exe" [2012-11-09 1433200]
"IDMan"="c:\program files\Internet Download Manager\IDMan.exe" [2014-03-31 3829328]
"SpyShelter"="c:\program files\SpyShelter Personal Free\SpyShelter.exe" [2014-02-13 5058912]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-11-13 173600]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-11-13 138784]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-11-13 172064]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RtHDVCpl.exe" [2009-09-22 7739936]
"egui"="c:\program files\ESET\ESET Smart Security\egui.exe" [2013-09-12 5110672]
"SDTray"="c:\program files\Spybot - Search & Destroy 2\SDTray.exe" [2013-07-25 5624784]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"<NO NAME>"= 014
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"DisableThumbnails"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37Crusader]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37CrusaderBoot]
@=""
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^FileBox eXtender.lnk]
backup=c:\windows\pss\FileBox eXtender.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^MultiClipBoard.lnk]
backup=c:\windows\pss\MultiClipBoard.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Dropbox.lnk]
backup=c:\windows\pss\Dropbox.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^LetMeType.lnk]
backup=c:\windows\pss\LetMeType.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^QClip.lnk]
backup=c:\windows\pss\QClip.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Spartan.lnk]
backup=c:\windows\pss\Spartan.lnk.Startup
backupExtension=.Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2013-04-04 21:06 958576 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2012-12-19 14:39 41208 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FlashGet 3]
2013-04-18 01:23 3377256 ----a-w- c:\program files\FlashGet Network\FlashGet 3\FlashGet3.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2013-02-18 17:43 116648 ----atw- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
2013-11-14 11:12 20584608 ----a-r- c:\program files\Skype\Phone\Skype.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Wondershare Helper Compact.exe]
2013-12-18 06:13 1980416 ----a-w- c:\program files\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe
.
R2 HWDeviceService.exe;HWDeviceService.exe;c:\programdata\DatacardService\HWDeviceService.exe [2010-11-16 264704]
R2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes Anti-Malware\mbamscheduler.exe [2014-03-05 1809720]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes Anti-Malware\mbamservice.exe [2014-03-05 857912]
R2 SDScannerService;Spybot-S&D 2 Scanner Service;c:\program files\Spybot - Search & Destroy 2\SDFSSvc.exe [2013-10-15 3921880]
R2 SDUpdateService;Spybot-S&D 2 Updating Service;c:\program files\Spybot - Search & Destroy 2\SDUpdSvc.exe [2013-09-20 1042272]
R2 SDWSCService;Spybot-S&D 2 Security Center Service;c:\program files\Spybot - Search & Destroy 2\SDWSCSvc.exe [2013-09-13 171416]
R2 WiseBootAssistant;Wise Boot Assistant;c:\program files\Wise\Wise Care 365\BootTime.exe [2013-12-09 580232]
R3 DigiartyVirtualCDBus;Digiarty Virtual Driver;c:\windows\system32\drivers\DigiartyVirtualCDBus.sys [2013-04-02 163616]
R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [2010-11-20 62464]
R3 esgiguard;esgiguard;c:\users\R\AppData\Local\Temp\RarSFX0\esgiguard.sys [x]
R3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\DRIVERS\ew_hwusbdev.sys [2013-01-12 102784]
R3 ManyCam;ManyCam Virtual Webcam;c:\windows\system32\DRIVERS\mcvidrv.sys [2012-10-11 34432]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2014-03-05 23256]
R3 mcaudrv_simple;ManyCam Virtual Microphone;c:\windows\system32\drivers\mcaudrv.sys [2013-01-31 22656]
R3 MFE_RR;MFE_RR;c:\users\R\AppData\Local\Temp\mfe_rr.sys [x]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2010-11-20 15872]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2010-07-01 34896]
R3 SEE;SoftEther Ethernet Layer Driver;c:\windows\system32\drivers\see.sys [2013-11-24 42976]
R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys [2010-11-20 77184]
R3 terminpt;Microsoft Remote Desktop Input Driver;c:\windows\system32\drivers\terminpt.sys [2010-11-20 25600]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 52224]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-20 27264]
R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys [2010-11-20 112640]
R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys [x]
R4 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [2013-10-23 172192]
S0 epfwwfp;epfwwfp;c:\windows\system32\DRIVERS\epfwwfp.sys [2013-09-17 49240]
S1 eamonm;eamonm;c:\windows\system32\DRIVERS\eamonm.sys [2013-09-17 188808]
S1 ehdrv;ehdrv;c:\windows\system32\DRIVERS\ehdrv.sys [2013-09-17 134248]
S1 EpfwLWF;Epfw NDIS LightWeight Filter;c:\windows\system32\DRIVERS\EpfwLWF.sys [2013-09-17 37416]
S1 mbamchameleon;mbamchameleon;c:\windows\system32\drivers\mbamchameleon.sys [2014-03-05 73432]
S1 SABI;SAMSUNG Kernel Driver For Windows 7;c:\windows\system32\Drivers\SABI.sys [2009-05-28 10752]
S1 Spyshelter;Spyshelter;c:\program files\SpyShelter Personal Free\SpyShelter.sys [2014-02-13 358240]
S2 ekrn;ESET Service;c:\program files\ESET\ESET Smart Security\ekrn.exe [2013-09-12 1337752]
S2 IDMWFP;IDMWFP;c:\windows\system32\DRIVERS\idmwfp.sys [2013-11-28 108000]
S2 WCMVCAM;WebcamMax, WDM Video Capture;c:\windows\system32\DRIVERS\wcmvcam.sys [2012-04-15 1068216]
S3 huawei_enumerator;huawei_enumerator;c:\windows\system32\DRIVERS\ew_jubusenum.sys [2013-01-12 73216]
S3 SafeIPS;SafeIPS;c:\program files\SafeIP\SafeIPs.exe [2013-06-28 3860480]
S3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\DRIVERS\vcsvad.sys [2008-12-26 17792]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x86.sys [2009-07-13 311296]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-03-15 17:23 1150280 ----a-w- c:\program files\Google\Chrome\Application\33.0.1750.154\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-04-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA1ce7c259d6f70f7.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-03 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000Core.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000UA1ce482131e04cee.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-04 c:\windows\Tasks\Wise Care 365.job
- c:\program files\Wise\Wise Care 365\WiseTray.exe [2013-05-31 09:08]
.
2014-04-04 c:\windows\Tasks\Wise Turbo Checker.job
- c:\program files\Wise\Wise Care 365\WiseTurbo.exe [2013-05-31 09:08]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = <-loopback>
uInternet Settings,ProxyServer = socks=127.0.0.1:9050
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Download all links by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallurl.htm
IE: Download all links with IDM - c:\program files\Internet Download Manager\IEGetAll.htm
IE: Download all videos by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallflvurl.htm
IE: Download by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgeturl.htm
IE: Download current video by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetflvurl.htm
IE: Download with IDM - c:\program files\Internet Download Manager\IEExt.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105
LSP: c:\windows\system32\SafeIPs.dll
Trusted Zone: parachat.com\chat
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{0055C089-8582-441B-A0BF-17B458C2A3A8}"=hex:51,66,7a,6c,4c,1d,38,12,e7,c3,46,
   04,b0,cb,75,01,df,a9,54,f4,5d,9c,e7,bc
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
   1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{72853161-30C5-4D22-B7F9-0BBC1D38A37E}"=hex:51,66,7a,6c,4c,1d,38,12,0f,32,96,
   76,f7,7e,4c,08,c8,ef,48,fc,18,66,e7,6a
"{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}"=hex:51,66,7a,6c,4c,1d,38,12,d5,94,07,
   72,c2,98,42,03,c9,fd,97,9a,f4,87,69,57
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
   df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}"=hex:51,66,7a,6c,4c,1d,38,12,8f,19,47,
   2e,c4,15,0b,03,d7,b5,8c,e9,62,70,06,85
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
   fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
   b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:79,0a,1a,3d,03,c0,ce,01
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}*]
@Allowed: (Read) (RestrictedCode)
"oajckabhnnkbideamojcnidgnkhggo"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"napcicofmiojnjfekbgjoickdocn"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"handmpidobhmphae"=hex:64,62,68,65,65,6e,6e,62,61,70,6e,6e,66,64,68,70,6c,6b,
   63,62,67,6c,68,6f,6c,6d,6a,70,6c,70,6c,70,65,68,68,69,61,70,67,66,00,f5
"gandmpidlbendf"=hex:6f,61,66,63,69,62,63,6d,63,6e,70,6a,67,61,66,63,63,67,6b,
   6c,70,62,66,6e,65,67,6b,63,6f,69,00,70
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{3B0B4D0C-AD08-A6C3-446E-91D04033ADAB}*]
@Allowed: (Read) (RestrictedCode)
"jaonlfppjbicilcimpch"=hex:64,62,6d,6f,66,65,69,63,6a,69,6d,67,61,6d,6d,63,63,
   63,6e,6f,70,65,6e,6b,61,66,6c,6d,6f,69,66,69,6c,63,65,67,68,6d,70,68,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{61FBAC5B-8BE1-ED45-0FC7-1B08A7E25B50}*]
@Allowed: (Read) (RestrictedCode)
"iaickoceiebejphnjc"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
"hacbimogbdfjjcjp"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A090CF22-0430-F8AB-E9A1-7377EDD82557}*]
"hanodfedhchcckea"=hex:61,62,61,6d,6f,6c,6a,6c,6f,70,6d,64,69,67,6b,69,6a,6c,
   63,6a,64,6d,62,69,69,6f,6c,6f,63,6c,67,6d,67,6b,00,74
"jamoohopkkjeomgbiedp"=hex:64,62,6b,6f,6b,6c,68,6e,6c,6a,6f,6b,67,64,6f,65,62,
   63,6c,65,64,6d,6e,69,70,6c,69,6a,64,70,6d,66,68,6c,65,67,64,65,67,6c,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}*]
"jalikbblohecbmghifgm"=hex:62,61,6f,63,00,00
"jalikbblohecbmghifkm"=hex:62,61,6f,63,00,00
"ialhgjikmbgifdkmlf"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
"habhmomcbpkoajpa"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}*]
@Allowed: (Read) (RestrictedCode)
"iadhjhjhhihpjhdnle"=hex:6b,61,67,64,69,6f,69,6c,6f,6b,65,68,62,6a,6d,6b,6c,6d,
   63,63,70,6c,00,00
"hanfljhlobpdlchp"=hex:6b,61,67,64,6d,6f,65,6d,64,67,67,6b,70,62,6f,68,6a,61,
   66,70,62,6f,00,00
"dakifghc"=hex:61,62,61,69,61,63,62,66,69,61,6b,62,68,62,65,6f,6c,6d,67,65,6a,
   68,6b,66,69,61,6e,67,62,68,6c,6f,62,69,00,00
"dakinajg"=hex:61,61,00,69
"dakibple"=hex:69,62,6a,64,6d,68,67,61,6d,65,62,62,64,6b,61,6e,66,66,65,66,66,
   6e,69,6f,6f,62,62,67,6f,6e,6e,6d,6f,62,6f,70,6a,70,70,6b,61,61,6c,6e,63,62,\
"dakicpfe"=hex:66,62,65,66,64,64,6a,63,65,6b,6e,67,64,70,6f,69,64,70,63,6d,61,
   68,69,6c,62,6d,65,66,6e,6e,6a,65,70,6f,6e,62,6a,6e,6d,62,6f,6b,61,6a,00,62
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2014-04-04  17:40:31
ComboFix-quarantined-files.txt  2014-04-04 12:10
ComboFix2.txt  2014-04-03 12:51
ComboFix3.txt  2014-04-02 12:01
.
Pre-Run: 49,184,899,072 bytes free
Post-Run: 49,136,177,152 bytes free
.
- - End Of File - - CBEB09FCA1B042A1EDC2978DA5F55470
A36C5E4F47E84449FF07ED3517B43A31
Link to post
Share on other sites

Combofix scripting

1. Close any open browsers.

2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

3. Download the attached CFScript.txt and save it to the location where Combofix is saved to.


CFScriptB-4.gif


Refering to the picture above, drag CFScript into ComboFix.exe

When finished, it shall produce a log for you at C:\ComboFix.txt which I will require in your next reply.

CFScript.txt

Link to post
Share on other sites

Hi

 

Here is the Log of latest CFscript. The scan always seems to spend maximum time at 49th stage. Also rebooting after the CF, sometime later Malwarebytes showed partial protection ( malicious website blocking off) and then when I started the dashboard it crashed. I rebooted it and it working fine now.

 

 

ComboFix 14-04-03.01 - R 04-04-2014  20:14:02.5.2 - x86
Microsoft Windows 7 Ultimate   6.1.7601.1.1252.91.1033.18.2009.1299 [GMT 5.5:30]
Running from: c:\users\R\Downloads\Programs\ComboFix.exe
Command switches used :: c:\users\R\Downloads\Programs\CFScript.txt
AV: ESET Smart Security 7.0 *Disabled/Updated* {19259FAE-8396-A113-46DB-15B0E7DFA289}
FW: ESET Personal firewall *Disabled* {211E1E8B-C9F9-A04B-6D84-BC85190CE5F2}
SP: ESET Smart Security 7.0 *Disabled/Updated* {A2447E4A-A5AC-AE9D-7C6B-2EC29C58E834}
SP: Spybot - Search and Destroy *Disabled/Updated* {9BC38DF1-3CCA-732D-A930-C1CA5F20A4B0}
SP: Windows Defender *Disabled/Updated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
.
.
(((((((((((((((((((((((((   Files Created from 2014-03-04 to 2014-04-04  )))))))))))))))))))))))))))))))
.
.
2014-04-04 16:36 . 2014-04-04 16:36 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-04-03 14:06 . 2014-03-05 03:56 51416 ----a-w- c:\windows\system32\drivers\mwac.sys
2014-04-03 14:06 . 2014-04-03 14:06 -------- d-----w- c:\program files\Malwarebytes Anti-Malware
2014-04-03 12:51 . 2014-04-04 16:36 -------- d-----w- c:\users\R\AppData\Local\temp
2014-04-03 06:32 . 2014-04-03 07:06 -------- d-----w- c:\programdata\Malwarebytes' Anti-Malware (portable)
2014-04-03 06:32 . 2014-04-04 13:00 107736 ----a-w- c:\windows\system32\drivers\MBAMSwissArmy.sys
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\users\R\AppData\Local\Currach Software
2014-04-01 06:10 . 2014-04-01 06:10 -------- d-----w- c:\program files\Currach Software
2014-03-31 16:16 . 2014-03-31 16:16 2 --shatr- c:\windows\winstart.bat
2014-03-30 06:29 . 2014-03-31 19:01 12872 ----a-w- c:\windows\system32\bootdelete.exe
2014-03-30 06:06 . 2014-03-30 14:00 -------- d-----w- c:\program files\HitmanPro
2014-03-30 06:05 . 2014-03-30 06:31 -------- d-----w- c:\programdata\HitmanPro
2014-03-29 13:17 . 2014-03-31 19:48 -------- d-----w- c:\users\R\AppData\Roaming\QuickScan
2014-03-27 15:33 . 2014-03-27 15:33 -------- d-----w- c:\programdata\CyberLink
2014-03-27 07:32 . 2014-03-27 14:32 -------- d-----w- c:\program files\softendo.com
2014-03-26 16:19 . 2014-03-26 16:19 62576 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\offreg.dll
2014-03-26 16:17 . 2014-03-17 04:46 7969936 ----a-w- c:\programdata\Microsoft\Windows Defender\Definition Updates\{40F4C292-1700-4BCF-BB9F-5165E0D1A7FC}\mpengine.dll
2014-03-26 01:31 . 2013-09-20 05:19 18968 ----a-w- c:\windows\system32\sdnclean.exe
2014-03-26 01:31 . 2014-03-27 04:55 -------- d-----w- c:\programdata\Spybot - Search & Destroy
2014-03-26 01:30 . 2014-03-26 01:36 -------- d-----w- c:\program files\Spybot - Search & Destroy 2
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\users\R\AppData\Local\SoftConstructors
2014-03-25 14:24 . 2014-03-25 14:24 -------- d-----w- c:\program files\SoftConstructors
2014-03-25 08:59 . 2014-04-02 10:36 -------- d-----w- c:\program files\TimeBell
2014-03-25 04:45 . 2014-03-05 03:56 73432 ----a-w- c:\windows\system32\drivers\mbamchameleon.sys
2014-03-25 02:34 . 2014-03-25 02:34 -------- d-----w- c:\users\R\AppData\Local\ElevatedDiagnostics
2014-03-24 12:47 . 2014-04-03 14:06 -------- d-----w- c:\users\R\AppData\Roaming\Malwarebytes
2014-03-24 12:47 . 2014-04-03 14:06 -------- d-----w- c:\programdata\Malwarebytes
2014-03-24 12:47 . 2014-03-05 03:56 23256 ----a-w- c:\windows\system32\drivers\mbam.sys
2014-03-21 13:42 . 2014-03-21 18:41 -------- d-----w- c:\users\R\AppData\Roaming\Mipony
2014-03-20 12:20 . 2013-11-28 00:24 108000 ----a-w- c:\windows\system32\drivers\idmwfp.sys
2014-03-19 13:08 . 2014-04-04 14:46 -------- d-----w- c:\users\R\AppData\Local\CrashDumps
2014-03-19 03:20 . 2013-05-22 14:33 33080 ----a-w- c:\windows\system32\SpyShelterShellExt.dll
2014-03-19 03:20 . 2014-02-08 07:51 3397120 ----a-w- c:\windows\system32\Osklauncher.exe
2014-03-19 03:20 . 2012-10-22 12:51 54784 ----a-w- c:\windows\system32\inject_logon_dll.dll
2014-03-19 03:20 . 2014-03-22 23:44 -------- d-----w- c:\users\R\AppData\Roaming\SpyShelter
2014-03-19 03:20 . 2014-03-19 03:20 -------- d-----w- c:\program files\SpyShelter Personal Free
2014-03-19 02:38 . 2014-03-19 02:38 -------- d-----w- c:\users\R\AppData\Local\Zemana
2014-03-18 08:06 . 2002-11-26 09:06 10752 ----a-w- c:\windows\system32\hh.exe
2014-03-18 08:06 . 2001-04-05 12:13 1009336 ----a-w- c:\windows\system32\mschrt20.ocx
2014-03-18 08:06 . 2014-03-18 08:06 -------- d-----w- c:\program files\Kiran's Typing Tutor
2014-03-18 06:43 . 2014-03-18 06:43 -------- d-----w- c:\program files\TypeFaster
2014-03-16 04:18 . 2014-03-16 04:18 -------- d-----w- c:\program files\ESET
2014-03-16 02:31 . 2014-03-16 02:31 -------- d-----w- c:\users\R\AppData\Roaming\CrystalIdea Software
2014-03-16 01:57 . 2014-03-16 03:17 -------- d-----w- c:\windows\system32\wbem\REP.OLD
2014-03-15 07:38 . 2014-03-15 07:38 -------- d-----w- c:\users\Default\AppData\Roaming\TuneUp Software
2014-03-15 06:51 . 2014-03-15 06:51 -------- d-----w- c:\users\R\AppData\Roaming\TuneUp Software
2014-03-12 08:30 . 2014-03-12 08:30 -------- d-----w- c:\program files\Java2
2014-03-09 17:53 . 2014-03-29 12:21 -------- d-----w- c:\program files\PhotoInstrument
2014-03-08 13:22 . 2014-03-08 13:22 -------- d-----w- c:\program files\SoftMaker FreeOffice
2014-03-08 04:10 . 2014-03-08 04:45 -------- d-----w- c:\windows\AF54923662584AC6A0435B5B89C6EB61.TMP
2014-03-08 04:10 . 2014-03-08 04:10 -------- d-----w- c:\program files\Common Files\Wise Installation Wizard
2014-03-07 03:48 . 2014-03-24 06:58 -------- d-----w- c:\program files\Dobermann
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-03-31 19:12 . 2013-01-13 17:37 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-03-31 19:12 . 2013-01-13 17:37 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-02-06 19:20 . 2014-02-16 02:30 33608 ----a-w- c:\windows\system32\drivers\tap0901.sys
2014-01-13 01:04 . 2013-12-09 07:33 286720 ------w- c:\windows\Setup1.exe
2014-01-13 01:04 . 2013-12-09 07:33 73216 ----a-w- c:\windows\ST6UNST.EXE
2014-01-13 00:51 . 2014-01-13 00:51 75776 ----a-w- c:\windows\system32\temp.001
2014-01-13 00:43 . 2014-01-13 00:43 75776 ----a-w- c:\windows\system32\temp.000
2014-01-06 19:23 . 2014-01-06 19:23 4558848 ----a-w- c:\windows\system32\GPhotos.scr
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\IDM Shell Extension]
@="{CDC95B92-E27C-4745-A8C5-64A52A78855D}"
[HKEY_CLASSES_ROOT\CLSID\{CDC95B92-E27C-4745-A8C5-64A52A78855D}]
2012-11-15 23:07 21904 ----a-w- c:\program files\Internet Download Manager\IDMShellExt.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Ditto"="c:\users\R\Desktop\ditto\DittoPortable\App\Ditto\Ditto.exe" [2012-11-09 1433200]
"IDMan"="c:\program files\Internet Download Manager\IDMan.exe" [2014-03-31 3829328]
"SpyShelter"="c:\program files\SpyShelter Personal Free\SpyShelter.exe" [2014-02-13 5058912]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-11-13 173600]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-11-13 138784]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-11-13 172064]
"RtHDVCpl"="c:\program files\Realtek\Audio\HDA\RtHDVCpl.exe" [2009-09-22 7739936]
"egui"="c:\program files\ESET\ESET Smart Security\egui.exe" [2013-09-12 5110672]
"SDTray"="c:\program files\Spybot - Search & Destroy 2\SDTray.exe" [2013-07-25 5624784]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 5 (0x5)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\system]
"<NO NAME>"= 014
.
[HKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\explorer]
"DisableThumbnails"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\hitmanpro37.sys]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37Crusader]
@=""
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\HitmanPro37CrusaderBoot]
@=""
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^FileBox eXtender.lnk]
backup=c:\windows\pss\FileBox eXtender.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^ProgramData^Microsoft^Windows^Start Menu^Programs^Startup^MultiClipBoard.lnk]
backup=c:\windows\pss\MultiClipBoard.lnk.CommonStartup
backupExtension=.CommonStartup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Dropbox.lnk]
backup=c:\windows\pss\Dropbox.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^LetMeType.lnk]
backup=c:\windows\pss\LetMeType.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^OneNote 2007 Screen Clipper and Launcher.lnk]
backup=c:\windows\pss\OneNote 2007 Screen Clipper and Launcher.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^QClip.lnk]
backup=c:\windows\pss\QClip.lnk.Startup
backupExtension=.Startup
.
[HKLM\~\startupfolder\C:^Users^R^AppData^Roaming^Microsoft^Windows^Start Menu^Programs^Startup^Spartan.lnk]
backup=c:\windows\pss\Spartan.lnk.Startup
backupExtension=.Startup
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe ARM]
2013-04-04 21:06 958576 ----a-w- c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Adobe Reader Speed Launcher]
2012-12-19 14:39 41208 ----a-w- c:\program files\Adobe\Reader 9.0\Reader\reader_sl.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\FlashGet 3]
2013-04-18 01:23 3377256 ----a-w- c:\program files\FlashGet Network\FlashGet 3\FlashGet3.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Google Update]
2013-02-18 17:43 116648 ----atw- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Skype]
2013-11-14 11:12 20584608 ----a-r- c:\program files\Skype\Phone\Skype.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Wondershare Helper Compact.exe]
2013-12-18 06:13 1980416 ----a-w- c:\program files\Common Files\Wondershare\Wondershare Helper Compact\WSHelper.exe
.
R2 HWDeviceService.exe;HWDeviceService.exe;c:\programdata\DatacardService\HWDeviceService.exe [2010-11-16 264704]
R2 MBAMScheduler;MBAMScheduler;c:\program files\Malwarebytes Anti-Malware\mbamscheduler.exe [2014-03-05 1809720]
R2 MBAMService;MBAMService;c:\program files\Malwarebytes Anti-Malware\mbamservice.exe [2014-03-05 857912]
R2 SDScannerService;Spybot-S&D 2 Scanner Service;c:\program files\Spybot - Search & Destroy 2\SDFSSvc.exe [2013-10-15 3921880]
R2 SDUpdateService;Spybot-S&D 2 Updating Service;c:\program files\Spybot - Search & Destroy 2\SDUpdSvc.exe [2013-09-20 1042272]
R2 SDWSCService;Spybot-S&D 2 Security Center Service;c:\program files\Spybot - Search & Destroy 2\SDWSCSvc.exe [2013-09-13 171416]
R2 WiseBootAssistant;Wise Boot Assistant;c:\program files\Wise\Wise Care 365\BootTime.exe [2013-12-09 580232]
R3 DigiartyVirtualCDBus;Digiarty Virtual Driver;c:\windows\system32\drivers\DigiartyVirtualCDBus.sys [2013-04-02 163616]
R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [2010-11-20 62464]
R3 esgiguard;esgiguard;c:\users\R\AppData\Local\Temp\RarSFX0\esgiguard.sys [x]
R3 ew_hwusbdev;Huawei MobileBroadband USB PNP Device;c:\windows\system32\DRIVERS\ew_hwusbdev.sys [2013-01-12 102784]
R3 ManyCam;ManyCam Virtual Webcam;c:\windows\system32\DRIVERS\mcvidrv.sys [2012-10-11 34432]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2014-03-05 23256]
R3 mcaudrv_simple;ManyCam Virtual Microphone;c:\windows\system32\drivers\mcaudrv.sys [2013-01-31 22656]
R3 MFE_RR;MFE_RR;c:\users\R\AppData\Local\Temp\mfe_rr.sys [x]
R3 RdpVideoMiniport;Remote Desktop Video Miniport Driver;c:\windows\system32\drivers\rdpvideominiport.sys [2010-11-20 15872]
R3 SCREAMINGBDRIVER;Screaming Bee Audio;c:\windows\system32\drivers\ScreamingBAudio.sys [2010-07-01 34896]
R3 SEE;SoftEther Ethernet Layer Driver;c:\windows\system32\drivers\see.sys [2013-11-24 42976]
R3 Synth3dVsc;Synth3dVsc;c:\windows\system32\drivers\synth3dvsc.sys [2010-11-20 77184]
R3 terminpt;Microsoft Remote Desktop Input Driver;c:\windows\system32\drivers\terminpt.sys [2010-11-20 25600]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [2010-11-20 52224]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [2010-11-20 27264]
R3 tsusbhub;tsusbhub;c:\windows\system32\drivers\tsusbhub.sys [2010-11-20 112640]
R3 VGPU;VGPU;c:\windows\system32\drivers\rdvgkmd.sys [x]
R4 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [2013-10-23 172192]
S0 epfwwfp;epfwwfp;c:\windows\system32\DRIVERS\epfwwfp.sys [2013-09-17 49240]
S1 eamonm;eamonm;c:\windows\system32\DRIVERS\eamonm.sys [2013-09-17 188808]
S1 ehdrv;ehdrv;c:\windows\system32\DRIVERS\ehdrv.sys [2013-09-17 134248]
S1 EpfwLWF;Epfw NDIS LightWeight Filter;c:\windows\system32\DRIVERS\EpfwLWF.sys [2013-09-17 37416]
S1 mbamchameleon;mbamchameleon;c:\windows\system32\drivers\mbamchameleon.sys [2014-03-05 73432]
S1 SABI;SAMSUNG Kernel Driver For Windows 7;c:\windows\system32\Drivers\SABI.sys [2009-05-28 10752]
S1 Spyshelter;Spyshelter;c:\program files\SpyShelter Personal Free\SpyShelter.sys [2014-02-13 358240]
S2 ekrn;ESET Service;c:\program files\ESET\ESET Smart Security\ekrn.exe [2013-09-12 1337752]
S2 IDMWFP;IDMWFP;c:\windows\system32\DRIVERS\idmwfp.sys [2013-11-28 108000]
S2 WCMVCAM;WebcamMax, WDM Video Capture;c:\windows\system32\DRIVERS\wcmvcam.sys [2012-04-15 1068216]
S3 huawei_enumerator;huawei_enumerator;c:\windows\system32\DRIVERS\ew_jubusenum.sys [2013-01-12 73216]
S3 SafeIPS;SafeIPS;c:\program files\SafeIP\SafeIPs.exe [2013-06-28 3860480]
S3 VCSVADHWSer;Avnex Virtual Audio Device (WDM);c:\windows\system32\DRIVERS\vcsvad.sys [2008-12-26 17792]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x86.sys [2009-07-13 311296]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-03-15 17:23 1150280 ----a-w- c:\program files\Google\Chrome\Application\33.0.1750.154\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-04-04 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-04 c:\windows\Tasks\GoogleUpdateTaskMachineUA1ce7c259d6f70f7.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-01-12 09:31]
.
2014-04-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000Core.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-04 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-296529163-4271216340-3131809865-1000UA1ce482131e04cee.job
- c:\users\R\AppData\Local\Google\Update\GoogleUpdate.exe [2013-03-04 17:43]
.
2014-04-04 c:\windows\Tasks\Wise Care 365.job
- c:\program files\Wise\Wise Care 365\WiseTray.exe [2013-05-31 09:08]
.
2014-04-04 c:\windows\Tasks\Wise Turbo Checker.job
- c:\program files\Wise\Wise Care 365\WiseTurbo.exe [2013-05-31 09:08]
.
.
------- Supplementary Scan -------
.
uInternet Settings,ProxyOverride = <-loopback>
uInternet Settings,ProxyServer = socks=127.0.0.1:9050
IE: Add to Google Photos Screensa&ver - c:\windows\system32\GPhotos.scr/200
IE: Download all links by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallurl.htm
IE: Download all links with IDM - c:\program files\Internet Download Manager\IEGetAll.htm
IE: Download all videos by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetallflvurl.htm
IE: Download by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgeturl.htm
IE: Download current video by FlashGet3 - c:\program files\FlashGet Network\FlashGet 3\BHO\fdgetflvurl.htm
IE: Download with IDM - c:\program files\Internet Download Manager\IEExt.htm
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~2\Office14\EXCEL.EXE/3000
IE: Se&nd to OneNote - c:\progra~1\MICROS~2\Office14\ONBttnIE.dll/105
LSP: c:\windows\system32\SafeIPs.dll
Trusted Zone: parachat.com\chat
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\Approved Extensions]
@Denied: (2) (LocalSystem)
"{0055C089-8582-441B-A0BF-17B458C2A3A8}"=hex:51,66,7a,6c,4c,1d,38,12,e7,c3,46,
   04,b0,cb,75,01,df,a9,54,f4,5d,9c,e7,bc
"{18DF081C-E8AD-4283-A596-FA578C2EBDC3}"=hex:51,66,7a,6c,4c,1d,38,12,72,0b,cc,
   1c,9f,a6,ed,07,da,80,b9,17,89,70,f9,d7
"{72853161-30C5-4D22-B7F9-0BBC1D38A37E}"=hex:51,66,7a,6c,4c,1d,38,12,0f,32,96,
   76,f7,7e,4c,08,c8,ef,48,fc,18,66,e7,6a
"{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}"=hex:51,66,7a,6c,4c,1d,38,12,d5,94,07,
   72,c2,98,42,03,c9,fd,97,9a,f4,87,69,57
"{DBC80044-A445-435B-BC74-9C25C1C588A9}"=hex:51,66,7a,6c,4c,1d,38,12,2a,03,db,
   df,77,ea,35,06,c3,62,df,65,c4,9b,cc,bd
"{2A541AE1-5BF6-4665-A8A3-CFA9672E4291}"=hex:51,66,7a,6c,4c,1d,38,12,8f,19,47,
   2e,c4,15,0b,03,d7,b5,8c,e9,62,70,06,85
"{FF059E31-CC5A-4E2E-BF3B-96E929D65503}"=hex:51,66,7a,6c,4c,1d,38,12,5f,9d,16,
   fb,68,82,40,0b,c0,2d,d5,a9,2c,88,11,17
"{BDEADE7F-C265-11D0-BCED-00A0C90AB50F}"=hex:51,66,7a,6c,4c,1d,38,12,11,dd,f9,
   b9,57,8c,be,54,c3,fb,43,e0,cc,54,f1,1b
.
[HKEY_USERS\.Default\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration]
@Denied: (2) (LocalSystem)
"Timestamp"=hex:79,0a,1a,3d,03,c0,ce,01
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{086BE988-583B-436E-8180-AB72BBD37652}*]
@Allowed: (Read) (RestrictedCode)
"oajckabhnnkbideamojcnidgnkhggo"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"napcicofmiojnjfekbgjoickdocn"=hex:69,61,6a,68,68,64,6d,62,64,6e,67,65,62,65,
   70,62,64,62,00,00
"handmpidobhmphae"=hex:64,62,68,65,65,6e,6e,62,61,70,6e,6e,66,64,68,70,6c,6b,
   63,62,67,6c,68,6f,6c,6d,6a,70,6c,70,6c,70,65,68,68,69,61,70,67,66,00,f5
"gandmpidlbendf"=hex:6f,61,66,63,69,62,63,6d,63,6e,70,6a,67,61,66,63,63,67,6b,
   6c,70,62,66,6e,65,67,6b,63,6f,69,00,70
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{3B0B4D0C-AD08-A6C3-446E-91D04033ADAB}*]
@Allowed: (Read) (RestrictedCode)
"jaonlfppjbicilcimpch"=hex:64,62,6d,6f,66,65,69,63,6a,69,6d,67,61,6d,6d,63,63,
   63,6e,6f,70,65,6e,6b,61,66,6c,6d,6f,69,66,69,6c,63,65,67,68,6d,70,68,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{61FBAC5B-8BE1-ED45-0FC7-1B08A7E25B50}*]
@Allowed: (Read) (RestrictedCode)
"iaickoceiebejphnjc"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
"hacbimogbdfjjcjp"=hex:69,61,62,69,6d,6f,63,69,6d,62,6e,6b,6b,6a,6e,6e,69,62,
   00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{A090CF22-0430-F8AB-E9A1-7377EDD82557}*]
"hanodfedhchcckea"=hex:61,62,61,6d,6f,6c,6a,6c,6f,70,6d,64,69,67,6b,69,6a,6c,
   63,6a,64,6d,62,69,69,6f,6c,6f,63,6c,67,6d,67,6b,00,74
"jamoohopkkjeomgbiedp"=hex:64,62,6b,6f,6b,6c,68,6e,6c,6a,6f,6b,67,64,6f,65,62,
   63,6c,65,64,6d,6e,69,70,6c,69,6a,64,70,6d,66,68,6c,65,67,64,65,67,6c,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{BC0A384C-75B2-8B2A-661D-1C938459337E}*]
"jalikbblohecbmghifgm"=hex:62,61,6f,63,00,00
"jalikbblohecbmghifkm"=hex:62,61,6f,63,00,00
"ialhgjikmbgifdkmlf"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
"habhmomcbpkoajpa"=hex:6b,61,6d,63,66,6b,70,69,62,62,6d,6a,63,66,6f,70,6e,6b,
   63,6a,66,62,00,00
.
[HKEY_USERS\S-1-5-21-296529163-4271216340-3131809865-1000\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{DA9C3B16-9640-4513-4341-C4DEFEA5D4B0}*]
@Allowed: (Read) (RestrictedCode)
"iadhjhjhhihpjhdnle"=hex:6b,61,67,64,69,6f,69,6c,6f,6b,65,68,62,6a,6d,6b,6c,6d,
   63,63,70,6c,00,00
"hanfljhlobpdlchp"=hex:6b,61,67,64,6d,6f,65,6d,64,67,67,6b,70,62,6f,68,6a,61,
   66,70,62,6f,00,00
"dakifghc"=hex:61,62,61,69,61,63,62,66,69,61,6b,62,68,62,65,6f,6c,6d,67,65,6a,
   68,6b,66,69,61,6e,67,62,68,6c,6f,62,69,00,00
"dakinajg"=hex:61,61,00,69
"dakibple"=hex:69,62,6a,64,6d,68,67,61,6d,65,62,62,64,6b,61,6e,66,66,65,66,66,
   6e,69,6f,6f,62,62,67,6f,6e,6e,6d,6f,62,6f,70,6a,70,70,6b,61,61,6c,6e,63,62,\
"dakicpfe"=hex:66,62,65,66,64,64,6a,63,65,6b,6e,67,64,70,6f,69,64,70,63,6d,61,
   68,69,6c,62,6d,65,66,6e,6e,6a,65,70,6f,6e,62,6a,6e,6d,62,6f,6b,61,6a,00,62
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0001\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0002\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
Completion time: 2014-04-04  22:10:20
ComboFix-quarantined-files.txt  2014-04-04 16:40
ComboFix2.txt  2014-04-04 12:10
ComboFix3.txt  2014-04-03 12:51
ComboFix4.txt  2014-04-02 12:01
.
Pre-Run: 49,259,216,896 bytes free
Post-Run: 49,207,701,504 bytes free
.
- - End Of File - - 90164D79D3A7423ADC3038AC6049AA2E
A36C5E4F47E84449FF07ED3517B43A31
Link to post
Share on other sites

Scan with ESET Online Scan

Please go to here to run the online scannner from ESET.

  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • Tick the box next to YES, I accept the Terms of Use.
  • Click Start
  • When asked, allow the activex control to install
  • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings and ensure these options are ticked:
    • Scan for potentially unwanted applications
  • Scan for potentially unsafe applications
  • Enable Anti-Stealth Technology

[*]Click Scan[*]Wait for the scan to finish[*]If any threats were found, click the 'List of found threats' , then click Export to text file.... [*]Save it to your desktop, then please copy and paste that log as a reply to this topic.

Link to post
Share on other sites

C:\AdwCleaner\Quarantine\C\Program Files\NCH Software\Recordpad\recordpad.exe.vir a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\AdwCleaner\Quarantine\C\Program Files\NCH Software\Recordpad\recordpadsetup_v4.32.exe.vir a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\Program Files\Hide ALL IP\HideAllIP.exe a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\Program Files\NCH Software\Recordpad\recordpad.exe a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\Program Files\NCH Software\Recordpad\recordpadsetup_v4.32.exe a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\Qoobox\Quarantine\C\Users\R\AppData\Roaming\WebcamMax-7.7.7.2.MultiLanguage.Setup.exe.vir a variant of Win32/Bundled.Toolbar.Ask.D potentially unsafe application

C:\Users\R\Downloads\Programs\ApexDC++_1.5.7_Setup.exe Win32/OpenCandy potentially unsafe application

C:\Users\R\Downloads\Programs\kbsetup.exe a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\Users\R\Downloads\Programs\rpsetup.exe a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\Users\R\Downloads\Programs\stsetup.exe a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

C:\Users\R\Downloads\Programs\Unlocker1.9.2.exe Win32/DownWare.L potentially unwanted application

C:\Users\R\Downloads\Programs\videopad.exe probably a variant of Win32/Toolbar.Conduit.H potentially unwanted application

C:\Users\R\Downloads\Programs\voxal voice changer.exe a variant of Win32/Bundled.Toolbar.Google.C potentially unsafe application

E:\1 NTFS_001\Downloads\Documents\Downloads\Compressed\Platinum.HideIP.3.1.4.6 giveaway\Platinum.HideIP.3.1.4.6\PlatinumHideIP-3.1.4.6.Setup.exe a variant of Win32/Bundled.Toolbar.Ask potentially unsafe application

E:\1 NTFS_001\System Volume Information\_restore{5C360E0B-B9D3-4B24-91EC-CA0276CF5E5B}\RP82\A0055166.exe probably a variant of Win32/Bundled.Toolbar.Ask potentially unsafe application
Link to post
Share on other sites

Then we can do the cleanup - if you are facing any issues, report that immediately.

Delete junk with adwCleaner


Please download AdwCleaner to your desktop.


  • Run adwcleaner.exe
  • Hit Scan and wait for the scan to finish.
  • Confirm the message but don´t uncheck anything.
  • Hit Clean
  • When the run is finished, it will open up a text file
  • Please post its contents within your next reply
  • You´ll find the log file at C:\AdwCleaner[s1].txt also


SecurityCheck

Please download SecurityCheck: LINK1 LINK2

  • Save it to your desktop, start it and follow the instructions in the window.
  • After the scan finished the (checkup.txt) will open. Copy its content to your thread.

Link to post
Share on other sites

Hi,  sorry I was out of town for one day.

 

Here is the Adwcleaner Log:

 

# AdwCleaner v3.023 - Report created 13/04/2014 at 18:20:10
# Updated 01/04/2014 by Xplode
# Operating System : Windows 7 Ultimate Service Pack 1 (32 bits)
# Username : R - R-PC
# Running from : C:\Users\R\Downloads\adwcleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKLM\SOFTWARE\Classes\PCProxy.DataContainer
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\au__rasapi32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\au__rasmancs
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{9DC8FA51-B596-4F77-802C-5B295919C205}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2974C985-8151-4DE5-B23C-B875F0A8522F}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3E28F712-0D6C-4EE3-AC8C-8F060F5D7C33}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{533403E2-6E21-4615-9E28-43F4E97E977B}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6CE321DA-DC11-45C6-A0FC-4E8A7D978ABC}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{6EEBC7FF-67DA-4B90-9251-C2C5696E4B48}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{74137531-80F7-406F-9543-7D11385FA8C8}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{832599B2-55BF-4437-8F3E-030CF5AEB262}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B1A429DB-FB06-4645-B7C0-0CC405EAD3CD}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DD67706E-819E-4EBD-BF8D-6D6147CC7A49}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F62A4AF9-58B4-4FEC-89CC-D717A547D8E8}
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v9.0.8112.16520
 
 
-\\ Mozilla Firefox v
 
[ File : C:\UseRs\R\AppData\Roaming\Mozilla\FiRefox\PRofiles\gnkyid3q.default\prefs.js ]
 
 
-\\ Google Chrome v34.0.1847.116
 
[ File : C:\Users\R\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
 
*************************
 
 
AdwCleaner[s1].txt - [2466 octets] - [24/03/2014 15:19:24]
AdwCleaner[s2].txt - [2107 octets] - [13/04/2014 18:20:10]
 
########## EOF - C:\AdwCleaner\AdwCleaner[s2].txt - [2167 octets] ##########
Link to post
Share on other sites

Here is the security check log file :

 

 Results of screen317's Security Check version 0.99.81  
 Windows 7 Service Pack 1 x86 (UAC is enabled)  
 Internet Explorer 11  
``````````````Antivirus/Firewall Check:`````````````` 
 Windows Firewall Enabled!  
ESET Smart Security 7.0   
 Antivirus up to date!   
`````````Anti-malware/Other Utilities Check:````````` 
 SpyShelter Personal Free 9.0  
 Spybot - Search & Destroy 
 Java 6 Update 45  
 Java version out of Date! 
 Adobe Flash Player 12.0.0.77  
 Adobe Reader 9 Adobe Reader out of Date! 
 Google Chrome 33.0.1750.154  
 Google Chrome 34.0.1847.116  
 Google Chrome Filzip.ini..  
````````Process Check: objlist.exe by Laurent````````  
 ESET NOD32 Antivirus egui.exe  
 ESET NOD32 Antivirus ekrn.exe  
 Malwarebytes Anti-Malware mbamservice.exe  
 Malwarebytes Anti-Malware mbam.exe  
 Spybot Teatimer.exe is disabled! 
`````````````````System Health check````````````````` 
 Total Fragmentation on Drive C:  
````````````````````End of Log`````````````````````` 
Link to post
Share on other sites

Your system is clean now! :)

 

 

 

Adobe Reader out of date

Your Adobe Reader is outdated. We will fix this.


  • Get the actual software from here. Important: Uncheck any optional software (for example Google Chrome, etc.) offered.
  • Run setup and follow the instructions.
  • Click upon Start-->control panel-->add/remove programs.
  • Search for and remove any older reader versions.

 

 

 

 

Java runtime Environment out of date

Your Java runtime environment is outdated. We will fix this.

  • Get the actual JRE from here
  • Save jxpiinstall.exe to your desktop
  • Close all running programs, especially your browser(s)
  • Run jxpiinstall.exe. This will download the newest JRE installer and install the software
  • when finished, go to
    Start-->control panel-->add/remove programs and remove all older Java versions. (if existing)
  • When finished, reboot your computer.


After the reboot

  • Open control panel again and click the java symbol.
  • Click Settings under Temporary Internet Files.
    The Temporary Files Settings dialog box appears.
  • Click Delete Files.
    The Delete Temporary Files dialog box appears
  • Click OK on Delete Temporary Files window.
  • Click OK again.

 

 

 

 

Uninstall our tools using delfix

Please follow these steps in order:

  1. In the case we used Defogger to turn off your CD emulation software. You can start it again and use the Enable button.
  2. In the case we used Combofix. Deactivate your antivirus software once more, then rename the combofix.exe to uninstall.exe and run it one last time. You shall be noted that Combofix has been removed.
  3. In any case please download delfix to your desktop.
    • Close all other programms and start delfix.
    • Please check all the boxes and run the tool.
    • delfix will now delete all found traces of our removal process

[*] If there is still something left please delete it manualy.

 

 

 

 

Recommendations: How to protect yourself

  • System Updates
    Please ensure to have automatic updates activated in your control panel.
    For further information and a tutorial, see this Microsoft Support article.
  • Protection
    What you need is one (not more) virus scanner with background protection. Additionally I recommend a special malware scanner to run on demand weekly.
    Personally I am using avast! Antivirus Free Edition and Malwarebytes Anti-Malware. They offer good protection for free.
    • To keep your browser free of advertising, you may install the Adblock Plus browser extension.
      It will filter unwanted advertising out of the website´s content.
    • To protect yourself from accidentally visiting malicious web sites, install the Web of Trust (WOT) browser extension.
      It will display a green (safe), yellow (unknown) or red (potentially dangerous) icon for a visited website within your browser.
      In addition, before accessing a dangerous classified web site, a warning screen is displayed.


    [*]Up to date Software
    Keep your Windows and your third party software up to date. The easiest way to get infected is an outdated windows, followed by: browser(s) (including add-ons and plug-ins), Adobe Flash Player and Adobe Reader, Java Runtime Environment, your antivirus program and so on. These links may help you to check:

    [*]Backup
    Hardware issues, malware, fire, lightning strike: There is a long list of different ways to loose all your data. Back up your files regularly. Use the windows internal backup function or a third party tool and save your data onto an external hard drive, cloud storage, optical media like CDs or DVDs or (if available) a professional network backup system. [*]Behaviour
    The commonest error when using a computer is "error 80" - what means that the error is located about 80cm in front of the monitor. This is a common joke between IT support technicians but it shows that all the safety mechanisms won´t help if you aren´t careful enough.

    • While surfing the internet, don´t click on anything you don´t know. In the worst case, it infects your system with malware.
    • Watch your step in social networks! Many cyber criminals use them to spread malware, mine personal pata (to be sold to advertising companies, for example) or simply do damage to other users. Even if a received hyperlink within a message seems to be coming from one of your friends, have a closer look. In addition, don´t click everything.
    • When installing software, have a look to each of the setup windows and uncheck any additional toolbars or free programs that may be offered additionally. Most of today´s setup procedures contain potentially unwanted programs so keep them off your system.
    • Avoid gaming sites, pirated software, cracking tools, keygens, and peer-to-peer (P2P) file sharing programs.
      They are a security risk which can make your computer susceptible to a wide variety of malware infections, remote attacks, exposure of personal information, and identity theft. Many malicious worms and Trojans spread across P2P file sharing networks, gaming and underground sites.



Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.