Jump to content
Due to inclement weather in Southwest Florida, our Clearwater support team is offline. Our other offices are available to assist you, however their responses may be delayed. We appreciate your patience and understanding during this time. ×

Difficult trojan help


Recommended Posts

Hi, I've run malware bytes a few times. Each time it picks up the same 13 items to be removed. It attempts to remove them and then asks to reboot the PC. If I select yes the PC will restart but after logging into my user the screen with go black and just display the mouse icon (which is moveable).

Symptoms include any antivirus/malware removal etc websites not loading on any browser.

I've run Farbar recover scan tool and this is the log. Hope you can help!

Thanks

Addition.txt

FRST.txt

Link to post
Share on other sites

Hello domi1989 and welcome to Malwarebytes,

My screen name is kevinf80, i`m here to help clean up your system, continue as follows please:

Uninstall Spybot search and destroy, re-boot when complete,

Next,

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into.
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Run FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

Next,

Please open Malwarebytes Anti-Malware.
 
  • On the Settings tab > Detection and Protection sub tab, Detection Options, tick the box "Scan for rootkits".
  • Under Non-Malware Protection sub tab Change PUP and PUM entries to Treat detections as Malware
  • Click on the Scan tab, then click on Scan Now >> . If an update is available, click the Update Now button.
  • A Threat Scan will begin.
  • When the scan is complete Apply Actions to any found entries.
  • Wait for the prompt to restart the computer to appear (if applicable), then click on Yes.
  • After the restart once you are back at your desktop, open MBAM once more.


To get the log from Malwarebytes do the following:
 
  • Click on the History tab > Application Logs.
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have three options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
    XML file (*.xml) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply
     
  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Next,

Download AdwCleaner by Xplode onto your Desktop.
 
  • Double click on Adwcleaner.exe to run the tool.
  • Click on the Scan in the Actions box
  • Please wait fot the scan to finish..
  • When "Waiting for action.Please uncheck elements you want to keep" shows in top line..
  • Click on the Cleaning box.
  • Next click OK on the "Closing Programs" pop up box.
  • Click OK on the Information box & again OK to allow the necessary reboot
  • After restart the AdwCleaner(C*)-Notepad log will appear, please copy/paste it in your next reply. Where * is the number relative to list of scans completed...


Next,

Download Sophos Free Virus Removal Tool and save it to your desktop.
 
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found please confirm that result....


Next,

Please download Security Analysis by Rocket Grannie from here: http://rocketgrannie.spywareinfoforum.org/RGSA.exe
 
  • Save it to your Desktop.
  • Close your security software to avoid potential conflicts.
  • Double click RGSA.exe
  • Click OK on the copyright-disclaimer
  • It will produce a log named SALog.txt on the Desktop or in the same folder from where the tool is run if installed elsewhere.
  • Please copy and paste the contents of that log in this topic.


Note: The link to the most current version of the program will always be in the first post of this topic.
Note: (Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run to continue.)
Note: The current java version on XP will show as "out of date".
Note: Flash Player ActiveX is pre-installed with Internet Explorer in Windows 10 and updates Automatically.

Please post your feedback in this topic.

Let me see those logs in your reply, also give an update on any remaining issues or concerns....

Thank you,

Kevin....

Fixlist.txt

Link to post
Share on other sites

Thanks so much. This website will load on this PC now so definitely an improvement! Hopefully this is the end of the issues.

Here are all the logs

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 19/06/2016
Scan Time: 21:14
Logfile:
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.06.19.05
Rootkit Database: v2016.05.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7
CPU: x86
File System: NTFS
User: X.Kate.X

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 315261
Time Elapsed: 53 min, 50 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 2
Trojan.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\ENUM\ROOT\LEGACY_MICORSOFT_WINDOWS_SERVICE, Delete-on-Reboot, [379ab7478d0c5adc3a4b5d9921e1d52b],
Trojan.Agent, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\Micorsoft Windows Service, Quarantined, [b51cae50f0a95dd922629d5929d906fa],

Registry Values: 1
Trojan.Dropper, HKU\S-1-5-21-1871111397-3539990770-1974983793-1000\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|ByuOgprj, C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe, Quarantined, [656caa540f8aed492c92c4c4f20eee12]

Registry Data: 5
Trojan.Dropper, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Userinit, C:\windows\system32\userinit.exe,,C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe, Good: (), Bad: (C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe),Replaced,[656caa540f8aed492c92c4c4f20eee12]
PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER|AntiVirusDisableNotify, 1, Good: (0), Bad: (1),Replaced,[b41dd62805942214952c46288e767090]
PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER|FirewallDisableNotify, 1, Good: (0), Bad: (1),Replaced,[ede4c8363465b5813290f9757094738d]
PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER|UpdatesDisableNotify, 1, Good: (0), Bad: (1),Replaced,[2ba6e915b7e2c670962d5d11de26cb35]
Hijack.UserInit, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINLOGON|Userinit, C:\windows\system32\userinit.exe,,C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe, Good: (userinit.exe), Bad: (C:\windows\system32\userinit.exe,,C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe),Replaced,[973afe007b1eb284549069fe19eb0af6]

Folders: 0
(No malicious items detected)

Files: 4
Trojan.Dropper, C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe, Quarantined, [656caa540f8aed492c92c4c4f20eee12],
Trojan.Dropper, C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe, Delete-on-Reboot, [2aa7d12de6b33501b30b7f09e61a26da],
Trojan.Dropper, C:\Windows\System32\hNJpb6p2, Quarantined, [8849d22cedaca492bc0247416c9426da],
Trojan.Dropper, C:\Users\X.Kate.X\AppData\Local\Temp\sepjlrtp.exe, Quarantined, [fbd63ac49afff73ff4caddabea1631cf],

Physical Sectors: 0
(No malicious items detected)


(end)

# AdwCleaner v5.200 - Logfile created 19/06/2016 at 22:16:03
# Updated 14/06/2016 by ToolsLib
# Database : 2016-06-19.1 [Server]
# Operating system : Windows 7 Home Premium  (X86)
# Username : X.Kate.X - XKATEX-PC
# Running from : C:\Users\X.Kate.X\Desktop\AdwCleaner.exe
# Option : Clean
# Support : https://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****

[-] Folder Deleted : C:\ProgramData\apn
[-] Folder Deleted : C:\ProgramData\AVG Secure Search
[-] Folder Deleted : C:\ProgramData\Partner
[#] Folder Deleted : C:\ProgramData\Application Data\apn
[#] Folder Deleted : C:\ProgramData\Application Data\AVG Secure Search
[#] Folder Deleted : C:\ProgramData\Application Data\Partner
[-] Folder Deleted : C:\windows\system32\config\systemprofile\AppData\LocalLow\AVG Secure Search
[-] Folder Deleted : C:\windows\system32\config\systemprofile\AppData\LocalLow\Toolbar4
[-] Folder Deleted : C:\Users\X.Kate.X\AppData\Local\AVG Secure Search
[-] Folder Deleted : C:\Users\X.Kate.X\AppData\LocalLow\AVG Secure Search
[-] Folder Deleted : C:\Users\X.Kate.X\AppData\LocalLow\Toolbar4

***** [ Files ] *****

[-] File Deleted : C:\END
[-] File Deleted : C:\Program Files\Mozilla Firefox\searchplugins\avg-secure-search.xml

***** [ DLLs ] *****


***** [ WMI ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****


***** [ Registry ] *****

[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\ScriptHelper.EXE
[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\ViProtocol.DLL
[-] Key Deleted : HKLM\SOFTWARE\Classes\PROTOCOLS\handler\viprotocol
[-] Key Deleted : HKLM\SOFTWARE\Google\Chrome\NativeMessagingHosts\avgsh
[-] Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@avg.com/AVG SiteSafety plugin,version=11.0.0.1,application/x-avg-sitesafety-plugin
[-] Key Deleted : HKLM\SOFTWARE\Classes\s
[-] Value Deleted : HKLM\SOFTWARE\Mozilla\Firefox\Extensions [Avg@toolbar]
[-] Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI
[-] Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.BrowserWndAPI.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj
[-] Key Deleted : HKLM\SOFTWARE\Classes\AVG Secure Search.PugiObj.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\Conduit.Engine
[-] Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.ProtectorBho
[-] Key Deleted : HKLM\SOFTWARE\Classes\protector_dll.ProtectorBho.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.GenericWnd
[-] Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.GenericWnd.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.NativeApi
[-] Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.NativeApi.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi
[-] Key Deleted : HKLM\SOFTWARE\Classes\ScriptHelper.ScriptHelperApi.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE
[-] Key Deleted : HKLM\SOFTWARE\Classes\ViProtocol.ViProtocolOLE.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1FDFF5A2-7BB1-48E1-8081-7236812B12B2}
[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BB711CB0-C70B-482E-9852-EC05EBD71DBB}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{408CFAD9-8F13-4747-8EC7-770A339C7237}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{933B95E2-E7B7-4AD9-B952-7AC336682AE3}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{94496571-6AC5-4836-82D5-D46260C44B17}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{95B7759C-8C7F-4BF1-B163-73684A933233}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B658800C-F66E-4EF3-AB85-6C0C227862A9}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{BC9FD17D-30F6-4464-9E53-596A90AFF023}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DE9028D0-5FFA-4E69-94E3-89EE8741F468}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F25AF245-4A81-40DC-92F9-E9021F207706}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B2BC04DF-EFBD-409A-95CA-36874E5AB92A}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{CA3A5461-96B5-46DD-9341-5350D3C94615}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{03E2A1F3-4402-4121-8B35-733216D61217}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4E92DB5F-AAD9-49D3-8EAB-B40CBE5B1FF7}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9E3B11F6-4179-4603-A71B-A55F4BCB0BEC}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C401D2CE-DC27-45C7-BC0C-8E6EA7F085D6}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{07CAC314-E962-4F78-89AB-DD002F2490EE}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{13ABD093-D46F-40DF-A608-47E162EC799D}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{74FB6AFD-DD77-4CEB-83BD-AB2B63E63C93}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{9C049BA6-EA47-4AC3-AED6-A66D8DC9E1D8}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C2AC8A0E-E48E-484B-A71C-C7A937FAAB94}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{95B7759C-8C7F-4BF1-B163-73684A933233}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{95B7759C-8C7F-4BF1-B163-73684A933233}
[-] Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{95B7759C-8C7F-4BF1-B163-73684A933233}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C6FDD0C3-266A-4DC3-B459-28C697C44CDC}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{F25AF245-4A81-40DC-92F9-E9021F207706}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{B2BC04DF-EFBD-409A-95CA-36874E5AB92A}
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID [{58124A0B-DC32-4180-9BFF-E0E21AE34026}]
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID [{977AE9CC-AF83-45E8-9E03-E2798216E2D5}]
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID [{A09AB6EB-31B5-454C-97EC-9B294D92EE2A}]
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{95B7759C-8C7F-4BF1-B163-73684A933233}]
[-] Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{E7DF6BFF-55A5-4EB7-A673-4ED3E9456D39}]
[-] Key Deleted : HKCU\Software\AVG Secure Search
[-] Key Deleted : HKCU\Software\Conduit
[-] Key Deleted : HKCU\Software\AppDataLow\Software\adawarebp
[-] Key Deleted : HKCU\Software\AppDataLow\Software\Conduit
[-] Key Deleted : HKLM\SOFTWARE\AVG Secure Search
[-] Key Deleted : HKLM\SOFTWARE\AVG Security Toolbar
[-] Key Deleted : HKLM\SOFTWARE\Conduit
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AVG Secure Search
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SearchTheWebARP
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0238BBE24EA3A70408B81E4BB89C15E5
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29799DE249E7DBC459FC6C8F07EB8375
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F7652513C62FF63448CFF05163719DB7
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\18C9E3869A16248439FE3FF9EB02207A
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\5D8011310B2622942868A458964FFDC5
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6C63F7979DCC2154CB9591969A5CB89D
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\6DD31E6C1A73B334383DF186676F4D20
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB3204F747B20694B8D49EF92D8DC94B
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C81E33A400B6F814E90C7A3354E2A3A5
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\EDBF68C5F16790341B7C6FD7C7F8E4FC
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\FFA531D0F3A71504DA7AC6A11CE33739
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Shared Tools\MsConfig\StartupReg\Iminent
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Shared Tools\MsConfig\StartupReg\IminentMessenger
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Shared Tools\MsConfig\StartupReg\ROC_roc_ssl_v12
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Shared Tools\MsConfig\StartupReg\vProt
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run [vProt]

***** [ Web browsers ] *****

[-] [C:\Users\X.Kate.X\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : uk.ask.com
[-] [C:\Users\X.Kate.X\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : ask search

*************************

:: "Tracing" keys deleted
:: Winsock settings cleared

*************************

C:\AdwCleaner\AdwCleaner[C1].txt - [9200 bytes] - [19/06/2016 22:16:03]
C:\AdwCleaner\AdwCleaner[S1].txt - [9127 bytes] - [19/06/2016 22:14:52]

########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [9346 bytes] ##########

2016-06-19 21:37:08.297    Threat 'W32/RamnitMem-E' has been cleaned up.
2016-06-19 21:37:08.297    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:37:08.297    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" has been cleaned up.
2016-06-19 21:37:08.297    File "C:\Windows\System32\svchost.exe" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:37:08.297    File "C:\Windows\System32\svchost.exe" has been cleaned up.
2016-06-19 21:37:08.297    Removal successful
2016-06-19 21:37:24.581    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c
2016-06-19 21:37:24.582    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe
2016-06-19 21:37:24.583    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe
2016-06-19 21:37:24.584    >>> Virus 'W32/RamnitMem-E' found in file HKU\S-1-5-21-1871111397-3539990770-1974983793-1000\Software\Microsoft\Windows\CurrentVersion\Run\ByuOgprj
2016-06-19 21:37:24.585    >>> Virus 'W32/RamnitMem-E' found in file HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:37:24.586    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe
2016-06-19 21:37:24.587    >>> Virus 'W32/RamnitMem-E' found in file HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:37:32.612    The following items will be cleaned up:
2016-06-19 21:37:32.612    W32/RamnitMem-E
2016-06-19 21:38:00.754    Threat 'W32/RamnitMem-E' has been cleaned up.
2016-06-19 21:38:00.754    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:38:00.754    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" has been cleaned up.
2016-06-19 21:38:00.754    File "C:\Windows\System32\svchost.exe" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:38:00.754    File "C:\Windows\System32\svchost.exe" has been cleaned up.
2016-06-19 21:38:00.754    Removal successful
2016-06-19 21:38:12.310    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c
2016-06-19 21:38:12.310    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe
2016-06-19 21:38:12.310    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe
2016-06-19 21:38:12.311    >>> Virus 'W32/RamnitMem-E' found in file HKU\S-1-5-21-1871111397-3539990770-1974983793-1000\Software\Microsoft\Windows\CurrentVersion\Run\ByuOgprj
2016-06-19 21:38:12.311    >>> Virus 'W32/RamnitMem-E' found in file HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:38:12.311    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe
2016-06-19 21:38:12.311    >>> Virus 'W32/RamnitMem-E' found in file HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:38:20.376    The following items will be cleaned up:
2016-06-19 21:38:20.377    W32/RamnitMem-E
2016-06-19 21:38:38.846    Threat 'W32/RamnitMem-E' has been cleaned up.
2016-06-19 21:38:38.846    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:38:38.847    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" has been cleaned up.
2016-06-19 21:38:38.847    File "C:\Windows\System32\svchost.exe" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:38:38.847    File "C:\Windows\System32\svchost.exe" has been cleaned up.
2016-06-19 21:38:38.847    Removal successful
2016-06-19 21:38:50.723    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c
2016-06-19 21:38:50.723    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe
2016-06-19 21:38:50.724    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe
2016-06-19 21:38:50.724    >>> Virus 'W32/RamnitMem-E' found in file HKU\S-1-5-21-1871111397-3539990770-1974983793-1000\Software\Microsoft\Windows\CurrentVersion\Run\ByuOgprj
2016-06-19 21:38:50.724    >>> Virus 'W32/RamnitMem-E' found in file HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:38:50.725    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe
2016-06-19 21:38:50.725    >>> Virus 'W32/RamnitMem-E' found in file HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:38:58.790    The following items will be cleaned up:
2016-06-19 21:38:58.790    W32/RamnitMem-E
2016-06-19 21:39:17.166    Threat 'W32/RamnitMem-E' has been cleaned up.
2016-06-19 21:39:17.166    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:39:17.166    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" has been cleaned up.
2016-06-19 21:39:17.166    File "C:\Windows\System32\svchost.exe" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:39:17.166    File "C:\Windows\System32\svchost.exe" has been cleaned up.
2016-06-19 21:39:17.166    Removal successful
2016-06-19 21:39:28.682    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c
2016-06-19 21:39:28.683    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe
2016-06-19 21:39:28.684    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe
2016-06-19 21:39:28.685    >>> Virus 'W32/RamnitMem-E' found in file HKU\S-1-5-21-1871111397-3539990770-1974983793-1000\Software\Microsoft\Windows\CurrentVersion\Run\ByuOgprj
2016-06-19 21:39:28.686    >>> Virus 'W32/RamnitMem-E' found in file HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:39:28.687    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe
2016-06-19 21:39:28.687    >>> Virus 'W32/RamnitMem-E' found in file HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:39:36.795    The following items will be cleaned up:
2016-06-19 21:39:36.795    W32/RamnitMem-E
2016-06-19 21:39:55.362    Threat 'W32/RamnitMem-E' has been cleaned up.
2016-06-19 21:39:55.363    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:39:55.363    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" has been cleaned up.
2016-06-19 21:39:55.363    File "C:\Windows\System32\svchost.exe" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:39:55.363    File "C:\Windows\System32\svchost.exe" has been cleaned up.
2016-06-19 21:39:55.363    Removal successful
2016-06-19 21:40:07.909    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c
2016-06-19 21:40:07.909    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe
2016-06-19 21:40:07.910    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe
2016-06-19 21:40:07.910    >>> Virus 'W32/RamnitMem-E' found in file HKU\S-1-5-21-1871111397-3539990770-1974983793-1000\Software\Microsoft\Windows\CurrentVersion\Run\ByuOgprj
2016-06-19 21:40:07.910    >>> Virus 'W32/RamnitMem-E' found in file HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:40:07.910    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe
2016-06-19 21:40:07.910    >>> Virus 'W32/RamnitMem-E' found in file HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:40:15.984    The following items will be cleaned up:
2016-06-19 21:40:15.985    W32/RamnitMem-E
2016-06-19 21:40:35.129    Threat 'W32/RamnitMem-E' has been cleaned up.
2016-06-19 21:40:35.129    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:40:35.129    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" has been cleaned up.
2016-06-19 21:40:35.129    File "C:\Windows\System32\svchost.exe" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:40:35.129    File "C:\Windows\System32\svchost.exe" has been cleaned up.
2016-06-19 21:40:35.129    Removal successful
2016-06-19 21:40:48.688    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c
2016-06-19 21:40:48.688    >>> Virus 'W32/RamnitMem-E' found in file C:\Windows\System32\svchost.exe
2016-06-19 21:40:48.689    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe
2016-06-19 21:40:48.689    >>> Virus 'W32/RamnitMem-E' found in file HKU\S-1-5-21-1871111397-3539990770-1974983793-1000\Software\Microsoft\Windows\CurrentVersion\Run\ByuOgprj
2016-06-19 21:40:48.689    >>> Virus 'W32/RamnitMem-E' found in file HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:40:48.689    >>> Virus 'W32/RamnitMem-E' found in file C:\Users\X.Kate.X\AppData\Local\ssdcvpis\byuogprj.exe
2016-06-19 21:40:48.689    >>> Virus 'W32/RamnitMem-E' found in file HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit
2016-06-19 21:40:56.776    The following items will be cleaned up:
2016-06-19 21:40:56.776    W32/RamnitMem-E
2016-06-19 21:41:16.545    Threat 'W32/RamnitMem-E' has been cleaned up.
2016-06-19 21:41:16.545    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:41:16.545    Process "C:\Windows\System32\svchost.exe:pid:000008bc:thread:0000092c" has been cleaned up.
2016-06-19 21:41:16.545    File "C:\Windows\System32\svchost.exe" belongs to 'W32/RamnitMem-E'.
2016-06-19 21:41:16.545    File "C:\Windows\System32\svchost.exe" has been cleaned up.
2016-06-19 21:41:16.545    Removal successful
2016-06-19 21:41:19.439    Warning: rootkit scan failed to open volume "\\?\Volume{80ae04d6-9fc2-11df-84df-0024542a0220}" (5)
2016-06-19 21:41:34.083    >>> Virus 'Mal/Azber-A' found in file C:\Users\X.Kate.X\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\byuogprj.exe
2016-06-19 21:49:35.839    Could not open C:\hiberfil.sys
2016-06-19 21:49:35.845    Could not open C:\pagefile.sys
2016-06-19 21:49:38.447    >>> Virus 'Mal/Azber-A' found in file C:\Program Files\3 Mobile Broadband\3Connect\hNJpb6p2
2016-06-19 21:49:38.447    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
2016-06-19 21:49:38.447    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
2016-06-19 21:49:38.447    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify
2016-06-19 21:49:38.448    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify
2016-06-19 21:49:38.449    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride
2016-06-19 21:49:38.450    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify
2016-06-19 21:49:38.451    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UACDisableNotify
2016-06-19 21:49:57.828    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\AnyPC Client\CallC03.dll
2016-06-19 21:49:58.021    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\AnyPC Client\CGLib.dll
2016-06-19 21:49:59.297    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\AnyPC Client\NetGUI.dll
2016-06-19 21:49:59.529    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\AnyPC Client\Nrcds3.dll
2016-06-19 21:49:59.694    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\AnyPC Client\SecComInfo.dll
2016-06-19 21:50:13.644    >>> Virus 'Mal/Azber-A' found in file C:\Program Files\Common Files\Apple\Apple Application Support\hNJpb6p2
2016-06-19 21:50:13.644    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
2016-06-19 21:50:13.644    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
2016-06-19 21:50:13.644    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify
2016-06-19 21:50:13.645    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify
2016-06-19 21:50:13.645    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride
2016-06-19 21:50:13.645    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify
2016-06-19 21:50:13.646    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UACDisableNotify
2016-06-19 21:50:42.311    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\CyberLink\deskband32.dll
2016-06-19 21:50:42.701    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Driver\8\Intel 32\IDriver.exe
2016-06-19 21:50:43.059    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Driver\8\Intel 32\IDriver2.exe
2016-06-19 21:50:43.233    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Driver\8\Intel 32\IScript8.dll
2016-06-19 21:50:43.541    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Driver\8\Intel 32\ISRT.dll
2016-06-19 21:50:43.797    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Driver\8\Intel 32\IUser8.dll
2016-06-19 21:50:44.020    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Driver\8\Intel 32\_ISRES1033.dll
2016-06-19 21:50:44.185    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\0701\Intel32\ctor.dll
2016-06-19 21:50:44.585    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\0701\Intel32\iKernel.dll
2016-06-19 21:50:44.771    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\0701\Intel32\iscript.dll
2016-06-19 21:50:44.911    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\0701\Intel32\iuser.dll
2016-06-19 21:50:45.384    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\10\00\Intel32\iKernel.dll
2016-06-19 21:50:45.605    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\10\00\Intel32\iscript.dll
2016-06-19 21:50:45.782    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\10\00\Intel32\iuser.dll
2016-06-19 21:50:46.196    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\11\50\Intel32\iKernel.dll
2016-06-19 21:50:46.384    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\11\50\Intel32\iscript.dll
2016-06-19 21:50:46.460    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\Professional\RunTime\11\50\Intel32\iuser.dll
2016-06-19 21:50:46.765    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\InstallShield\UpdateService\agent.exe
2016-06-19 21:51:00.949    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\microsoft shared\SFPCA Cache\msxml3.dll
2016-06-19 21:51:01.427    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\microsoft shared\TextConv\msvcr71.dll
2016-06-19 21:51:01.966    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\microsoft shared\VC\msdia80.dll
2016-06-19 21:51:06.275    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\Samsung\SSCSettings\SSCSettings.exe
2016-06-19 21:51:06.401    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\Samsung\SSCSettings\SSCSettingsInstall.exe
2016-06-19 21:51:09.299    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Common Files\System\Ole DB\MSOLAP80.DLL
2016-06-19 21:52:21.366    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\CyberLink\PowerDVD8\AudioFilter\ComTruSurroundXT.dll
2016-06-19 21:52:21.798    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\CyberLink\PowerDVD8\AudioFilter\DolbyHph.dll
2016-06-19 21:52:22.156    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\CyberLink\PowerDVD8\AudioFilter\IZDSP.dll
2016-06-19 21:52:22.353    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\CyberLink\PowerDVD8\AudioFilter\LakeControl.dll
2016-06-19 21:52:38.057    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\CyberLink\PowerDVD8\VideoFilter\CV.DLL
2016-06-19 21:52:38.791    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\CyberLink\PowerDVD8\xerces-c_2_6.dll
2016-06-19 21:53:24.591    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\InstallShield Installation Information\{17283B95-21A8-4996-97DA-547A48DB266F}\setup.exe
2016-06-19 21:53:25.935    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\InstallShield Installation Information\{178EE5F4-0F86-4BF0-A0D1-9790AFF409D1}\setup.exe
2016-06-19 21:53:33.507    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\InstallShield Installation Information\{5DB1DF0C-AABC-4362-8A6D-CEFDFB036E41}\setup.exe
2016-06-19 21:53:38.329    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\InstallShield Installation Information\{D1434266-0486-4469-B338-A60082CC04E1}\setup.exe
2016-06-19 21:54:43.432    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Marvell\Miniport Driver\infpu.dll
2016-06-19 21:54:43.695    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Marvell\Miniport Driver\installu.exe
2016-06-19 21:54:44.240    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Marvell\Miniport Driver\yk62x86.dll
2016-06-19 21:54:47.558    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Chess\Chess.exe
2016-06-19 21:54:47.804    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\FreeCell\FreeCell.exe
2016-06-19 21:54:47.970    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Hearts\Hearts.exe
2016-06-19 21:54:48.600    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Mahjong\Mahjong.exe
2016-06-19 21:54:49.044    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Minesweeper\MineSweeper.exe
2016-06-19 21:54:49.349    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckg.dll
2016-06-19 21:54:50.014    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgRes.dll
2016-06-19 21:54:50.140    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Backgammon\bckgzm.exe
2016-06-19 21:54:50.365    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Checkers\Chkr.dll
2016-06-19 21:54:50.719    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Checkers\ChkrRes.dll
2016-06-19 21:54:50.870    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Checkers\chkrzm.exe
2016-06-19 21:54:51.217    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Spades\Shvl.dll
2016-06-19 21:54:52.286    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Spades\ShvlRes.dll
2016-06-19 21:54:52.427    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Multiplayer\Spades\shvlzm.exe
2016-06-19 21:54:52.962    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe
2016-06-19 21:54:57.638    >>> Virus 'Mal/Azber-A' found in file C:\Program Files\Microsoft Games\Solitaire\hNJpb6p2
2016-06-19 21:54:57.638    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
2016-06-19 21:54:57.638    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
2016-06-19 21:54:57.639    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify
2016-06-19 21:54:57.639    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify
2016-06-19 21:54:57.640    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride
2016-06-19 21:54:57.640    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify
2016-06-19 21:54:57.640    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UACDisableNotify
2016-06-19 21:54:57.748    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\Solitaire\Solitaire.exe
2016-06-19 21:54:57.911    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaire.exe
2016-06-19 21:55:10.076    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Silverlight\4.1.10329.0\coreclr.dll
2016-06-19 21:55:20.073    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft SQL Server Compact Edition\v3.1\sqlceca30.dll
2016-06-19 21:55:20.196    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft SQL Server Compact Edition\v3.1\sqlcecompact30.dll
2016-06-19 21:55:20.348    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft SQL Server Compact Edition\v3.1\sqlceme30.dll
2016-06-19 21:55:20.439    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft SQL Server Compact Edition\v3.1\sqlceoledb30.dll
2016-06-19 21:55:20.543    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft SQL Server Compact Edition\v3.1\sqlceqp30.dll
2016-06-19 21:55:20.647    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft SQL Server Compact Edition\v3.1\sqlcese30.dll
2016-06-19 21:55:26.509    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Works\msvcr71.dll
2016-06-19 21:55:27.494    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Works\WkImg90.dll
2016-06-19 21:55:27.932    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Works\WkProof.dll
2016-06-19 21:55:28.837    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Microsoft Works\wksssdb.dll
2016-06-19 21:55:32.046    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Mozilla Firefox\plugins\npqtplugin6.dll
2016-06-19 21:55:32.139    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Mozilla Firefox\plugins\npqtplugin7.dll
2016-06-19 21:55:42.586    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\BatteryLifeExtender\Drv\SABI2x86\KStartMem.exe
2016-06-19 21:55:43.735    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\BatteryLifeExtender\Drv\SabiExecuter.exe
2016-06-19 21:55:43.949    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\BatteryLifeExtender\InstallHelper.exe
2016-06-19 21:55:44.304    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\BatteryLifeExtender\SABI2.dll
2016-06-19 21:55:44.556    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\BatteryLifeExtender\StartUpSetup.exe
2016-06-19 21:55:44.812    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\BatteryLifeExtender\UninstallHelper.exe
2016-06-19 21:55:45.004    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Display Manager\DeviceCtrl.dll
2016-06-19 21:55:45.581    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Display Manager\DMLauncher_Vista.exe
2016-06-19 21:55:45.896    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Display Manager\EDM-BatteryWarning.exe
2016-06-19 21:55:46.124    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Display Manager\HookDllUSB.dll
2016-06-19 21:55:46.438    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Display Manager\HotKeyOption.exe
2016-06-19 21:55:47.684    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Display Manager\S3Dapi32.dll
2016-06-19 21:55:48.468    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\EasyNetworkMobility.exe
2016-06-19 21:55:48.683    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\ENM.exe
2016-06-19 21:55:48.977    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\HelpLaunch.exe
2016-06-19 21:55:53.202    >>> Virus 'Mal/Azber-A' found in file C:\Program Files\Samsung\Easy Network Manager\hNJpb6p2
2016-06-19 21:55:53.202    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
2016-06-19 21:55:53.202    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
2016-06-19 21:55:53.204    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify
2016-06-19 21:55:53.204    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify
2016-06-19 21:55:53.205    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride
2016-06-19 21:55:53.205    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify
2016-06-19 21:55:53.205    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UACDisableNotify
2016-06-19 21:55:53.470    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\Mobility.exe
2016-06-19 21:55:54.771    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\Support\InstallHelper.exe
2016-06-19 21:55:54.991    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\Support\SamsungMobilityPanel.exe
2016-06-19 21:55:55.213    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\Support\SMCM.exe
2016-06-19 21:55:55.565    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\Easy Network Manager\Support\UninstallHelper.exe
2016-06-19 21:55:55.751    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\EasyBatteryManager\EasyBatteryMgr4.exe
2016-06-19 21:55:56.133    >>> Virus 'W32/Ramnit-BD' found in file C:\Program Files\Samsung\EasySpeedUpManager\OSCHeckDriverInst.exe
2016-06-19 21:55:59.583    >>> Virus 'Mal/Azber-A' found in file C:\Program Files\Samsung\SamsungManual\hNJpb6p2
2016-06-19 21:55:59.583    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
2016-06-19 21:55:59.583    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
2016-06-19 21:55:59.584    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify
2016-06-19 21:55:59.584    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallDisableNotify
2016-06-19 21:55:59.585    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\FirewallOverride
2016-06-19 21:55:59.585    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify
2016-06-19 21:55:59.586    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\UACDisableNotify
2016-06-19 21:56:02.130    >>> Virus 'Mal/Azber-A' found in file C:\Program Files\Samsung\SamsungManual\samsungmanual_eng\hNJpb6p2
2016-06-19 21:56:02.130    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA
2016-06-19 21:56:02.131    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusOverride
2016-06-19 21:56:02.131    >>> Virus 'Mal/Azber-A' found in file HKLM\SOFTWARE\Microsoft\Security Center\AntiVirusDisableNotify

Fixlog.txt

Link to post
Share on other sites

  • Root Admin

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.