urtreasured Posted December 1, 2013 Report Share Posted December 1, 2013 When starting computer I receive a malware warning, says its from MS & I need to download and run program. I believe it is a scam notice. Computer does run slow. Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Howdy and welcome to BestTechie !!! My name is flashh4 (Chuck) and i will be assisting you with the cleaning of your computer.Run these 1 at a time & post each log as you get it ! Work them as your time permits you to !!If you don't understand something, please don't hesitate to ask for clarification before proceeding !!! You can PM me if you need to !!Do Not Remove anything or run any tools/programs until advised to do so !Perform all actions in the order given.Please stay with us until we give you the "All Clean Speech"! Just because the problem has stopped it may still need some clean-up ! Please note that all instructions given are customized for this computer only, the tools used may cause damage if used on a computer with different infections. If you think you have similar problems, please post a log in the Malware Removal forum and wait for help. =================================== Most of these programs/tools will pop-up a log after the re-boot so DO NOT close them until you have copied & pasted into your topic !! AdwCleaner Please download adwcleaner by Xplode onto your desktop.Double click on AdwCleaner.exe to run the tool again. Windows XP : Double click on the icon to run it. Windows Vista, Windows 7 & 8 : Right click and select "Run as Administrator" *Click on the Scan button. *AdwCleaner will begin to scan your computer like it did before. *After the scan has finished ....... This time, click on the Clean button. *Press OK when asked to close all programs and follow the onscreen prompts. *Press OK again to allow AdwCleaner to restart the computer and complete the removal process. *After rebooting, a logfile report (AdwCleaner[s0].txt) will open automatically. *Copy and paste the contents of that logfile in your next reply. *A copy of that logfile will also be saved in the C:\AdwCleaner folder.NEXT Please download Junkware Removal Tool and save to your desk top. Shut down your protection software now to avoid potential conflicts. * Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator". * The tool will open and start scanning your system. * Please be patient as this can take a while to complete depending on your system's specifications. * On completion, a log (JRT.txt) is saved to your desktop and will automatically open. * Post the contents of JRT.txt into your next reply ! Re-Boot your computer now !!NEXTMALWAREBYTES with Pics:Please download Malwarebytes' Anti-Malware to your desktop. * Double-click mbam-setup.exe and follow the prompts to install the program. * At the end, be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish. * If an update is found, it will download and install the latest version. * Once the program has loaded, select Perform quick scan, then click Scan.When the scan is complete, click OK, then Show Results to view the results. * Then click Remove Selected . * When completed, a log will open in Notepad. Please save it to a convenient location and post the results. * Note: If you receive a notice that some of the items couldn't be removed, that they have been added to the delete on reboot list, please reboot.The log can also be found here: C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt Or via the Logs tab when the application is started.Please don't attach the scans / logs, use "copy/paste".Post next:1. AdwCleaner Log2. Junkware Removal Log3. Malwarebytes logThanksChuck Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 AdwCleaner v3.013 - Report created 01/12/2013 at 08:32:55# Updated 24/11/2013 by Xplode# Operating System : Windows Vista Home Premium Service Pack 2 (32 bits)# Username : Owner - GMB# Running from : C:\Users\Owner\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\218J2H0B\2-adwcleaner[1].exe# Option : Clean***** [ Services ] ********** [ Files / Folders ] *****Folder Deleted : C:\ProgramData\DriverCureFolder Deleted : C:\ProgramData\ParetoLogicFolder Deleted : C:\ProgramData\TrymediaFolder Deleted : C:\Program Files\AskBarDisFolder Deleted : C:\Program Files\DAEMON Tools ToolbarFolder Deleted : C:\Program Files\ParetoLogicFolder Deleted : C:\Program Files\TelevisionFanaticEIFolder Deleted : C:\Program Files\Common Files\ParetoLogicFolder Deleted : C:\Users\Owner\AppData\Local\PackageAwareFolder Deleted : C:\Users\Owner\AppData\Local\StartNowFolder Deleted : C:\Users\Owner\AppData\LocalLow\boost_interprocessFolder Deleted : C:\Users\Owner\AppData\Roaming\DriverCureFolder Deleted : C:\Users\Owner\AppData\Roaming\ParetoLogicFolder Deleted : C:\Users\Owner\AppData\Roaming\SystweakFolder Deleted : C:\Users\Owner\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ParetoLogicFolder Deleted : C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\Extensions\incfcgceegpikennjoplhfghaaikdgeiFile Deleted : C:\ENDFile Deleted : C:\Windows\system32\roboot.exeFile Deleted : C:\Program Files\Mozilla Firefox\Components\AskSearch.jsFile Deleted : C:\Windows\Tasks\paretologic registration3.jobFile Deleted : C:\Windows\System32\Tasks\paretologic registration3File Deleted : C:\Windows\Tasks\paretologic update version3.jobFile Deleted : C:\Windows\System32\Tasks\paretologic update version3File Deleted : C:\Windows\Tasks\PC Health Advisor Defrag.jobFile Deleted : C:\Windows\System32\Tasks\PC Health Advisor DefragFile Deleted : C:\Windows\Tasks\PC Health Advisor.jobFile Deleted : C:\Windows\System32\Tasks\PC Health Advisor***** [ Shortcuts ] ********** [ Registry ] *****[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{F2BADB71-4106-43D9-AAD9-2AF2E99807C1}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{F2BADB71-4106-43D9-AAD9-2AF2E99807C1}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{7518A537-1042-4173-BED9-EAA3A5A89587}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{7518A537-1042-4173-BED9-EAA3A5A89587}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{AAD5DA67-BF86-4E91-A1A6-4028B01B135B}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{F74A9ECA-9EDC-4885-87D9-E934868ED14B}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{F74A9ECA-9EDC-4885-87D9-E934868ED14B}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Plain\{5C32D128-C32B-4F39-A0CF-D80EB108D0F8}[#] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{5C32D128-C32B-4F39-A0CF-D80EB108D0F8}Key Deleted : HKLM\SOFTWARE\Classes\AppID\WMHelper.DLLKey Deleted : HKLM\Software\Classes\popcaploader.popcaploaderctrl2Key Deleted : HKLM\Software\Classes\popcaploader.popcaploaderctrl2.1Key Deleted : HKLM\SOFTWARE\Classes\speedupmypcKey Deleted : HKLM\SOFTWARE\Classes\AppID\{A7DDCBDE-5C86-415C-8A37-763AE183E7E4}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{0702A2B6-13AA-4090-9E01-BCDC85DD933F}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{08993A7C-E764-4172-9627-BFB5EA6897B2}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{128A6C66-AC6A-4617-8268-AB7F47B7215E}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{201F27D4-3704-41D6-89C1-AA35E39143ED}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{27BF8F8D-58B8-D41C-F913-B7EEB57EF6F6}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{3041D03E-FD4B-44E0-B742-2D9B88305F98}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{571715D7-3395-4DF0-B43C-784836209E60}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{622FD888-4E91-4D68-84D4-7262FD0811BF}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{9AFB8248-617F-460D-9366-D71CDEDA3179}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B0DE3308-5D5A-470D-81B9-634FC078393B}Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DF780F87-FF2B-4DF8-92D0-73DB16A1543A}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4634804A-F0B0-4A74-A550-FC0EEF8A4362}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{4C07EA4F-5F52-4222-B170-4CD9ED33BAEA}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B37B4BA6-334E-72C1-B57E-6AFE8F8A5AF3}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B77AD4AC-C1C2-B293-7737-71E13A11FFEA}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C44FEFF4-EF0C-4CF7-83D0-92B4266A32B9}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E4E3E0F8-CD30-4380-8CE9-B96904BDEFCA}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E773F2CF-5E6E-FF2B-81A1-AC581A26B2B2}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F131923C-381D-4E4C-A472-4A17118FD742}Key Deleted : HKLM\SOFTWARE\Classes\Interface\{FE8A736F-4124-4D9C-B4B1-3B12381EFABE}Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{4B1C1E16-6B34-430E-B074-5928ECA4C150}Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{96F7FABC-5789-EFA4-B6ED-1272F4C1D27B}Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{C9C5DEAF-0A1F-4660-8279-9EDFAD6FEFE1}Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{D2E5FA06-DCC7-46F9-BEFF-BFD06F69B9B2}Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{201F27D4-3704-41D6-89C1-AA35E39143ED}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{0702A2B6-13AA-4090-9E01-BCDC85DD933F}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{201F27D4-3704-41D6-89C1-AA35E39143ED}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{3041D03E-FD4B-44E0-B742-2D9B88305F98}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{32099AAC-C132-4136-9E9A-4E364A424E17}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{5911488E-9D1E-40EC-8CBB-06B231CC153F}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{6E13D095-45C3-4271-9475-F3B48227DD9F}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B0DE3308-5D5A-470D-81B9-634FC078393B}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF780F87-FF2B-4DF8-92D0-73DB16A1543A}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{201F27D4-3704-41D6-89C1-AA35E39143ED}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{3041D03E-FD4B-44E0-B742-2D9B88305F98}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{6E13D095-45C3-4271-9475-F3B48227DD9F}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{B0DE3308-5D5A-470D-81B9-634FC078393B}Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{ABD93EAF-D775-BC54-E63B-2804F22FD156}Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{3041D03E-FD4B-44E0-B742-2D9B88305F98}]Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{3041D03E-FD4B-44E0-B742-2D9B88305F98}]Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{32099AAC-C132-4136-9E9A-4E364A424E17}]Key Deleted : HKCU\Software\ParetoLogicKey Deleted : HKCU\Software\YahooPartnerToolbarKey Deleted : HKCU\Software\ZugoKey Deleted : HKCU\Software\AppDataLow\AskBarDisKey Deleted : HKLM\Software\Freeze.comKey Deleted : HKLM\Software\ParetoLogicKey Deleted : HKLM\Software\TelevisionFanaticEIKey Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{3CBF3EBB-235D-4c29-A68B-2BB1F428586E}Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Ask Toolbar_is1Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{3CBF3EBB-235D-4c29-A68B-2BB1F428586E}Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\Ask Toolbar_is1Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536***** [ Browsers ] *****-\\ Internet Explorer v8.0.6001.18928-\\ Mozilla Firefox v-\\ Google Chrome v[ File : C:\Users\Owner\AppData\Local\Google\Chrome\User Data\Default\preferences ]Deleted : homepageDeleted : icon_urlDeleted : search_urlDeleted : urls_to_restore_on_startup*************************AdwCleaner[R0].txt - [8854 octets] - [01/12/2013 08:29:47]AdwCleaner[s0].txt - [8971 octets] - [01/12/2013 08:32:55]########## EOF - C:\AdwCleaner\AdwCleaner[s0].txt - [9031 octets] ########## Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Urtreasured, very good start on the cleaning. I see a few things we will remove later in a write fix i will do ! ThanksChuck Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Junkware Removal Tool (JRT) by ThisisuVersion: 6.0.8 (11.05.2013:1)OS: Windows Vista Home Premium x86Ran by Owner on Sun 12/01/2013 at 8:52:59.74~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Services ~~~ Registry Values ~~~ Registry Keys ~~~ Files ~~~ FoldersSuccessfully deleted: [Folder] "C:\Program Files\bigfix"Successfully deleted: [Folder] "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\uniblue" ~~~ Event Viewer Logs were cleared ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Scan was completed on Sun 12/01/2013 at 9:01:05.91End of JRT log~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Untreasured, That one wasn't as full as i expected ! But lets see what else we can find,i want your computer completely clean when we are done ! Chuck Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 Thanks for helping. I try to keep away from anything suspicious, and do not download anything that I do not trust. In the process of running the malware bytes program. Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 By the way what are the "warning points" ? Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Ok, i got some more programs for you to run after i see the Malwarebytes log, so stay tuned till i give you the all clean, just because the pop-ups may be gone we still want to check for any left-overs ! Chuck Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Thats if you are using bad language or post unwanted sites, stuff like that ! Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 alwarebytes Anti-Malware (Trial) 1.75.0.1300www.malwarebytes.orgDatabase version: v2013.12.01.03Windows Vista Service Pack 2 x86 NTFSInternet Explorer 8.0.6001.18928Owner :: GMB [administrator]Protection: Enabled12/1/2013 9:19:17 AMmbam-log-2013-12-01 (09-19-17).txtScan type: Quick scanScan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUMScan options disabled: P2PObjects scanned: 218250Time elapsed: 20 minute(s), 5 second(s)Memory Processes Detected: 0(No malicious items detected)Memory Modules Detected: 0(No malicious items detected)Registry Keys Detected: 0(No malicious items detected)Registry Values Detected: 0(No malicious items detected)Registry Data Items Detected: 1HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced|Start_ShowSearch (PUM.Hijack.StartMenu) -> Bad: (0) Good: (1) -> Quarantined and repaired successfully.Folders Detected: 1C:\Users\Owner\AppData\Local\Temp\ct3298566 (PUP.Optional.Conduit.A) -> No action taken.Files Detected: 12C:\Users\Owner\AppData\Local\Temp\checktbexist.exe (PUP.Optional.Conduit.A) -> No action taken.C:\Users\Owner\AppData\Local\Temp\MixiCND_CID2.exe (PUP.Optional.Conduit.A) -> No action taken.C:\Users\Owner\AppData\Local\Temp\ct3298566\ctbe.exe (PUP.Optional.Conduit.A) -> No action taken.C:\Users\Owner\AppData\Local\Temp\ct3298566\stub.exe (PUP.Optional.Conduit.A) -> No action taken.C:\Users\Owner\Local Settings\Temporary Internet Files\Content.IE5\218J2H0B\Flash_Player_Pro_Setup[1].exe (PUP.Optional.Ibryte) -> No action taken.C:\Users\Owner\Local Settings\Temporary Internet Files\Content.IE5\NATJHWVC\stublogic[1].exe (PUP.Optional.Conduit.A) -> No action taken.C:\Users\Owner\Local Settings\Temporary Internet Files\Content.IE5\TXQJ6JAX\MixiCND_CID2[1] (PUP.Optional.Conduit.A) -> No action taken.C:\Users\Owner\Local Settings\Temporary Internet Files\Content.IE5\YL48QF00\checktbexist[1].exe (PUP.Optional.Conduit.A) -> No action taken.C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NJS9L276\updater-startnow-200-2.4[1].exe (PUP.Optional.SweetPacks.A) -> No action taken.C:\Windows\System32\config\systemprofile\Local Settings\Temporary Internet Files\Content.IE5\NJS9L276\updater-startnow-200-2.5[1].exe (PUP.Optional.SweetPacks.A) -> No action taken.C:\Users\Owner\AppData\Local\Temp\ct3298566\chromeid.txt (PUP.Optional.Conduit.A) -> No action taken.C:\Users\Owner\AppData\Local\Temp\ct3298566\setup.ini.txt (PUP.Optional.Conduit.A) -> No action taken.(end) Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Place a check in the box beside each entry, that it finds, then click remove selected !! As in the instructions above ! Chuck Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 Malwarebytes Anti-Malware (Trial) 1.75.0.1300www.malwarebytes.orgDatabase version: v2013.12.01.03Windows Vista Service Pack 2 x86 NTFSInternet Explorer 8.0.6001.18928Owner :: GMB [administrator]Protection: Enabled12/1/2013 10:57:29 AMMBAM-log-2013-12-01 (11-13-56).txtScan type: Quick scanScan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUMScan options disabled: P2PObjects scanned: 218342Time elapsed: 13 minute(s), 47 second(s)Memory Processes Detected: 0(No malicious items detected)Memory Modules Detected: 0(No malicious items detected)Registry Keys Detected: 0(No malicious items detected)Registry Values Detected: 0(No malicious items detected)Registry Data Items Detected: 0(No malicious items detected)Folders Detected: 1C:\Users\Owner\AppData\Local\Temp\ct3298566 (PUP.Optional.Conduit.A) -> No action taken.Files Detected: 0(No malicious items detected)(end) Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Untreasured, i removed the tripple post of Malwarebytes, which i don't know why ! We will take care of the line that was causing problems ! Security Check Please download and save SecurityCheck.exe to your Desktop from one of the links below.Link 1 >>> http://screen317.spywareinfoforum.org/SecurityCheck.exe.Link 2 >>> http://screen317.changelog.fr/SecurityCheck.exe * Double click SecurityCheck.exe and follow the onscreen instructions inside the black box. * A Notepad document should open automatically called checkup.txt * Please post the contents of that document in your next reply.NEXTRun a scan with DDS .....Download and save it to your Desktop. >>> DDS * Double click dds.scr to run the tool. * If using Vista or Windows 7 you will be prompted by UAC, please allow the prompt. DDS will now scan your computer. * When the scan is complete, DDS will open two (2) logs: 1.DDS.txt 2.Attach.txt If not saved these logs will be automatically deleted when closed, so save both to your Desktop. Please note it is important that you post BOTH logs in your topic.Please note: DDS will ask you to attach the second log (Attach.txt), please ignore this notice and post the log instead.Any problems downloading or running DDS.scr, try THIS (DDS.com) version of DDS.If you still have problems running DDS, notify me immediately !!NEXTRun RogueKillerIMPORTANT: Do not reboot your computer if at all possible otherwise the malware will reactivate and you will have to run RogueKiller againDownload RogueKiller to your desktop. >>> http://www.sur-la-toile.com/RogueKiller/RogueKiller.exe close all running programs for Windows Vista/Seven, right click -> run as administrator, for XP simply double-click on RogueKiller.exe when the prescan is finished, click on Scan click on Report and copy/paste the content in your next post.[/list If the program is blocked, do not hesitate to try several times. If it really does not work (it could happen), rename it to winlogon.exePlease post the contents of the RKreport.txt in your next reply.Post Next:1. SecurityCheck Log2. DDS log(s)3. RogueKiller logThanksChuck Link to post Share on other sites
flashh4 Posted December 1, 2013 Report Share Posted December 1, 2013 Security Check will show some things that are out dated, DO NOT update them till i tell you to !!!! Chuck Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 security check results Results of screen317's Security Check version 0.99.77 Windows Vista Service Pack 2 x86 (UAC is enabled) Internet Explorer 8 Out of date! Internet Explorer 8 ``````````````Antivirus/Firewall Check:`````````````` Windows Firewall Enabled! Microsoft Security Essentials avast! Antivirus Antivirus up to date! `````````Anti-malware/Other Utilities Check:````````` Spy Sweeper Malwarebytes Anti-Malware version 1.75.0.1300 Java SE Runtime Environment 6 Java version out of Date! Adobe Reader 8 Adobe Reader out of Date! Google Chrome 31.0.1650.48 Google Chrome 31.0.1650.57 ````````Process Check: objlist.exe by Laurent```````` Microsoft Security Essentials MSMpEng.exe Microsoft Security Essentials msseces.exe Malwarebytes Anti-Malware mbamservice.exe Malwarebytes Anti-Malware mbamgui.exe Malwarebytes' Anti-Malware mbamscheduler.exe Alwil Software Avast5 AvastSvc.exe Alwil Software Avast5 AvastUI.exe `````````````````System Health check````````````````` Total Fragmentation on Drive C: 10 % Defragment your hard drive soon! (Do NOT defrag if SSD!)````````````````````End of Log`````````````````````` Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 DDS log DDS (Ver_2012-11-20.01) - NTFS_x86Internet Explorer: 8.0.6001.18928Run by Owner at 12:35:01 on 2013-12-01Microsoft® Windows Vista™ Home Premium 6.0.6002.2.1252.1.1033.18.1917.598 [GMT -7:00].AV: Microsoft Security Essentials *Enabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}AV: avast! Antivirus *Enabled/Updated* {C37D8F93-0602-E43C-40AA-47DAD597F308}SP: avast! Antivirus *Enabled/Updated* {781C6E77-2038-EBB2-7A1A-7CA8AE10B9B5}SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}SP: Microsoft Security Essentials *Enabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}.============== Running Processes ================.C:\Windows\system32\wininit.exeC:\Windows\system32\lsm.exec:\Program Files\Microsoft Security Client\MsMpEng.exeC:\Windows\system32\Ati2evxx.exeC:\Windows\system32\SLsvc.exeC:\Windows\system32\Ati2evxx.exeC:\Program Files\Alwil Software\Avast5\AvastSvc.exeC:\Windows\system32\Dwm.exeC:\Windows\Explorer.EXEC:\Program Files\Synaptics\SynTP\SynTPEnh.exeC:\Program Files\Motorola\SMSERIAL\sm56hlpr.exeC:\Program Files\HP\HP Software Update\hpwuSchd2.exeC:\Program Files\Alwil Software\Avast5\AvastUI.exeC:\Program Files\Microsoft Security Client\msseces.exeC:\Program Files\Linksys EasyLink Advisor\LinksysAgent.exeC:\Windows\ehome\ehtray.exeC:\Windows\System32\ctfmon.exeC:\Windows\ehome\ehmsas.exeC:\Program Files\HP\Digital Imaging\bin\hpqtra08.exeC:\Windows\System32\spoolsv.exeC:\Windows\system32\taskeng.exeC:\Program Files\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exeC:\Program Files\Wondershare\1-Click PC Care\CareMon.exeC:\Program Files\Common Files\New Boundary\PrismXL\PRISMXL.SYSC:\Program Files\Common Files\Intuit\QuickBooks\QBCFMonitorService.exeC:\Program Files\Webroot\Spy Sweeper\SpySweeper.exeC:\Windows\system32\SearchIndexer.exeC:\Windows\system32\taskeng.exec:\Program Files\Microsoft Security Client\NisSrv.exeC:\Program Files\HP\Digital Imaging\bin\hpqSTE08.exeC:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\wmiprvse.exeC:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exeC:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exeC:\Program Files\Malwarebytes' Anti-Malware\mbamgui.exeC:\Program Files\Internet Explorer\iexplore.exeC:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\Macromed\Flash\FlashUtil32_11_5_502_135_ActiveX.exeC:\Program Files\Internet Explorer\iexplore.exeC:\Windows\system32\SearchFilterHost.exeC:\Windows\system32\SearchProtocolHost.exec:\Program Files\Microsoft Security Client\MpCmdRun.exeC:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\svchost.exe -k DcomLaunchC:\Windows\system32\svchost.exe -k rpcssC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestrictedC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestrictedC:\Windows\system32\svchost.exe -k netsvcsC:\Windows\system32\svchost.exe -k GPSvcGroupC:\Windows\system32\svchost.exe -k LocalServiceC:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkC:\Windows\system32\svchost.exe -k hpdevmgmtC:\Windows\System32\svchost.exe -k HPZ12C:\Windows\System32\svchost.exe -k HPZ12C:\Windows\system32\svchost.exe -k imgsvcC:\Windows\System32\svchost.exe -k WerSvcGroupC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation.============== Pseudo HJT Report ===============.BHO: Adobe PDF Reader Link Helper: {06849E9F-C8D7-4D59-B87D-784B7D6BE0B3} - c:\program files\common files\adobe\acrobat\activex\AcroIEHelper.dllBHO: DivX Plus Web Player HTML5 <video>: {326E768D-4182-46FD-9C16-1449A49795F4} - c:\program files\divx\divx plus web player\ie\divxhtml5\DivXHTML5.dllBHO: SSVHelper Class: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre1.6.0\bin\ssv.dlluRun: [startCCC] "c:\program files\ati" technologies\ati.ace\core-static\CLIStart.exeuRun: [EasyLinkAdvisor] "c:\program files\linksys easylink advisor\LinksysAgent.exe" /startupuRun: [ehTray.exe] c:\windows\ehome\ehTray.exeuRun: [ctfmon.exe] c:\windows\system32\ctfmon.exeuRun: [Google Update] "c:\users\owner\appdata\local\google\update\GoogleUpdate.exe" /cuRun: [Google Update] "c:\users\owner\appdata\local\google\update\GoogleUpdate.exe" /cmRun: [synTPEnh] c:\program files\synaptics\syntp\SynTPEnh.exemRun: [sMSERIAL] "c:\program files\motorola\smserial\sm56hlpr.exe"mRun: [HP Software Update] c:\program files\hp\hp software update\HPWuSchd2.exemRun: [avast5] "c:\program files\alwil software\avast5\avastUI.exe" /noguimRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkeymRun: [MRT] "c:\windows\system32\MRT.exe" /RmRunOnce: [Malwarebytes Anti-Malware] c:\program files\malwarebytes' anti-malware\mbamgui.exe /install /silentStartupFolder: c:\progra~2\micros~1\windows\startm~1\programs\startup\hpdigi~1.lnk - c:\program files\hp\digital imaging\bin\hpqtra08.exemPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0mPolicies-System: EnableUIADesktopToggle = dword:0IE: E&xport to Microsoft Excel - c:\progra~1\micros~2\office12\EXCEL.EXE/3000IE: {08B0E5C0-4FCB-11CF-AAA5-00401C608501} - {CAFEEFAC-0016-0000-0000-ABCDEFFEDCBC} - c:\program files\java\jre1.6.0\bin\npjpi160.dllIE: {2670000A-7350-4f3c-8081-5663EE0C6C49} - {48E73304-E1D6-4330-914C-F5F514E3486C} - c:\program files\microsoft office\office12\ONBttnIE.dllIE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}TCP: NameServer = 192.168.1.1TCP: Interfaces\{4A852085-0994-4D10-A7C7-3AFD957332FD} : DHCPNameServer = 192.168.1.1TCP: Interfaces\{7840614F-02D1-4405-9E3B-A5D2CEF6D027} : DHCPNameServer = 4.2.2.1 4.2.2.2 4.2.2.3Handler: intu-help-qb3 - {c5e479ea-0a65-4b05-8c6c-2fc8cc682eb4} - c:\program files\intuit\quickbooks 2010\HelpAsyncPluggableProtocol.dllHandler: qbwc - {FC598A64-626C-4447-85B8-53150405FD57} -Notify: WRNotifier - WRLogonNTF.dllLSA: Security Packages = kerberos msv1_0 schannel wdigest tspkgmASetup: ccc-core-static - msiexec /fums {9EB1C655-331C-5034-CCF8-436FA4B4A3DA} /qb.============= SERVICES / DRIVERS ===============.R?2 CareMon;CareMon;c:\program files\wondershare\1-click pc care\CareMon.exe [2013-5-8 146792]R0 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2013-9-27 214696]R1 aswSP;aswSP;c:\windows\system32\drivers\aswSP.sys [2013-10-6 294608]R2 aswFsBlk;aswFsBlk;c:\windows\system32\drivers\aswFsBlk.sys [2013-10-6 17744]R2 aswMonFlt;aswMonFlt;c:\windows\system32\drivers\aswMonFlt.sys [2013-10-6 51280]R2 avast! Antivirus;avast! Antivirus;c:\program files\alwil software\avast5\AvastSvc.exe [2013-10-6 40384]R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-10-6 21504]R2 NisDrv;Microsoft Network Inspection System;c:\windows\system32\drivers\NisDrvWFP.sys [2011-4-27 104768]R2 WebrootSpySweeperService;Webroot Spy Sweeper Engine;c:\program files\webroot\spy sweeper\SpySweeper.exe [2007-4-20 3572592]R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2013-12-1 22856]R3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2013-12-1 40776]R3 NisSrv;Microsoft Network Inspection;c:\program files\microsoft security client\NisSrv.exe [2013-10-23 280288]R3 RTL8187;Realtek RTL8187 Wireless 802.11b/g 54Mbps USB 2.0 Network Adapter;c:\windows\system32\drivers\RTL8187.sys [2007-11-19 288256]S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384].=============== File Associations ===============.ShellExec: pi11.exe: Open="c:\program files\microsoft digital image 2006\pi.exe" "%1".=============== Created Last 30 ================.2013-12-01 17:00:22 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys2013-12-01 16:30:52 62576 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\{949d561d-cb26-4bce-8e0c-195e0089ef99}\offreg.dll2013-12-01 16:16:57 -------- d-----w- c:\users\owner\appdata\roaming\Malwarebytes2013-12-01 16:16:27 -------- d-----w- c:\programdata\Malwarebytes2013-12-01 16:16:22 22856 ----a-w- c:\windows\system32\drivers\mbam.sys2013-12-01 16:16:22 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware2013-12-01 15:52:52 -------- d-----w- c:\windows\ERUNT2013-12-01 15:29:44 -------- d-----w- C:\AdwCleaner2013-12-01 08:36:16 7772552 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\{949d561d-cb26-4bce-8e0c-195e0089ef99}\mpengine.dll2013-11-30 09:28:50 7772552 ------w- c:\programdata\microsoft\microsoft antimalware\definition updates\backup\mpengine.dll2013-11-12 23:36:26 719224 ------w- c:\programdata\microsoft\microsoft antimalware\definition updates\{ec099350-56ee-477a-a272-b7fe2d190fbe}\gapaengine.dll.==================== Find3M ====================.2013-11-19 10:21:30 230048 ------w- c:\windows\system32\MpSigStub.exe2013-09-27 16:53:06 214696 ----a-w- c:\windows\system32\drivers\MpFilter.sys2013-09-27 16:53:06 104768 ----a-w- c:\windows\system32\drivers\NisDrvWFP.sys.============= FINISH: 12:36:56.94 =============== Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 Attach log .UNLESS SPECIFICALLY INSTRUCTED, DO NOT POST THIS LOG.IF REQUESTED, ZIP IT UP & ATTACH IT.DDS (Ver_2012-11-20.01).Microsoft® Windows Vista™ Home PremiumBoot Device: \Device\HarddiskVolume2Install Date: 2/26/2007 6:29:25 AMSystem Uptime: 12/1/2013 9:03:02 AM (3 hours ago).Motherboard: Gateway | | Processor: AMD Turion 64 X2 Mobile Technology TL-52 | Socket M2/S1G1 | 1600/200mhz.==== Disk Partitions =========================.C: is FIXED (NTFS) - 139 GiB total, 52.288 GiB free.D: is FIXED (NTFS) - 10 GiB total, 4.634 GiB free.E: is CDROM ()F: is CDROM ().==== Disabled Device Manager Items =============.Class GUID: {4d36e972-e325-11ce-bfc1-08002be10318}Description: Microsoft ISATAP AdapterDevice ID: ROOT\*ISATAP\0002Manufacturer: MicrosoftName: Microsoft ISATAP Adapter #2PNP Device ID: ROOT\*ISATAP\0002Service: tunnel.==== System Restore Points ===================.RP3265: 11/29/2013 12:00:03 AM - Scheduled CheckpointRP3266: 11/29/2013 3:00:20 AM - Windows UpdateRP3267: 11/30/2013 12:00:02 AM - Scheduled CheckpointRP3268: 11/30/2013 3:00:20 AM - Windows UpdateRP3269: 12/1/2013 12:00:03 AM - Scheduled CheckpointRP3270: 12/1/2013 3:00:21 AM - Windows Update.==== Installed Programs ======================. Update for Microsoft Office 2007 (KB2508958)32 Bit HP CIO Components InstallerActivation Assistant for the 2007 Microsoft Office suitesAdobe Flash Player 11 ActiveXAdobe Reader 8.1.3Adobe Shockwave Player 11.6AIO_ScanApple Mobile Device SupportATI Catalyst Install ManagerATI UninstallerAutodesk DWF ViewerBigFixBufferChmCatalyst Control Center Core ImplementationCatalyst Control Center Graphics Full ExistingCatalyst Control Center Graphics Full NewCatalyst Control Center Graphics LightCatalyst Control Center Graphics Previews VistaCatalyst Control Center Localization ArabicCatalyst Control Center Localization Chinese StandardCatalyst Control Center Localization Chinese TraditionalCatalyst Control Center Localization CzechCatalyst Control Center Localization FinnishCatalyst Control Center Localization FrenchCatalyst Control Center Localization GermanCatalyst Control Center Localization GreekCatalyst Control Center Localization HungarianCatalyst Control Center Localization ItalianCatalyst Control Center Localization JapaneseCatalyst Control Center Localization KoreanCatalyst Control Center Localization Spanishccc-core-staticccc-localization-daccc-utilityCCC Help Chinese StandardCCC Help Chinese TraditionalCCC Help CzechCCC Help DanishCCC Help DutchCCC Help EnglishCCC Help FinnishCCC Help FrenchCCC Help GermanCCC Help GreekCCC Help HungarianCCC Help ItalianCCC Help JapaneseCCC Help KoreanCCC Help NorwegianCCC Help PolishCCC Help PortugueseCCC Help RussianCCC Help SpanishCCC Help SwedishCCC Help ThaiCCC Help TurkishCommand & Conquer The First DecadeCommand & Conquer™ 4 Tiberian TwilightCopyCustomerResearchQFolderCutePDF Writer 2.8DestinationsDeviceManagementQFolderDISH Optimizer Ver 2011-06-01DivX Free CodecDivX SetupDJ_AIO_ProductContextDJ_AIO_SoftwareDJ_AIO_Software_minDrivers Install For Linksys Easylink AdvisorEmployee Scheduling AssistanteSupportQFolderF4100F4100_HelpGateway Recovery Center InstallerGoogle ChromeHGTV Home & Landscape Platinum SuiteHotfix for Microsoft .NET Framework 3.5 SP1 (KB953595)Hotfix for Microsoft .NET Framework 3.5 SP1 (KB958484)HP Customer Participation Program 8.0HP Deskjet All-In-One Software 8.0HP Imaging Device Functions 8.0HP Photosmart EssentialHP Solution Center 8.0HP UpdateHPProductAssistantHPSSupplyJava SE Runtime Environment 6Linksys EasyLink Advisor 1.6 (0032)Malwarebytes Anti-Malware version 1.75.0.1300MarketResearchMicrosoft .NET Framework 3.5 SP1Microsoft .NET Framework 4 Client ProfileMicrosoft Digital Image Library 9 - BlockerMicrosoft Digital Image Starter Edition 2006Microsoft Digital Image Starter Edition 2006 EditorMicrosoft Digital Image Starter Edition 2006 LibraryMicrosoft Money 2006Microsoft Office 2007 Primary Interop AssembliesMicrosoft Office 2007 Service Pack 3 (SP3)Microsoft Office Excel MUI (English) 2007Microsoft Office File Validation Add-InMicrosoft Office Home and Student 2007Microsoft Office OneNote MUI (English) 2007Microsoft Office Outlook MUI (English) 2007Microsoft Office PowerPoint MUI (English) 2007Microsoft Office Proof (English) 2007Microsoft Office Proof (French) 2007Microsoft Office Proof (Spanish) 2007Microsoft Office Proofing (English) 2007Microsoft Office Proofing Tools 2007 Service Pack 3 (SP3)Microsoft Office Shared MUI (English) 2007Microsoft Office Shared Setup Metadata MUI (English) 2007Microsoft Office Standard 2007Microsoft Office Word MUI (English) 2007Microsoft Security ClientMicrosoft Security EssentialsMicrosoft SilverlightMicrosoft Visual C++ 2005 ATL Update kb973923 - x86 8.0.50727.4053Microsoft Visual C++ 2005 RedistributableMicrosoft Visual C++ 2008 Redistributable - KB2467174 - x86 9.0.30729.5570Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.4148Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161Microsoft Visual Studio 2005 Tools for Office RuntimeMicrosoft WorksMotorola SM56 Data Fax ModemMSXML 4.0 SP2 (KB927978)MSXML 4.0 SP2 (KB936181)MSXML 4.0 SP2 (KB941833)MSXML 4.0 SP2 (KB954430)MSXML 4.0 SP2 (KB973688)MSXML 4.0 SP2 Parser and SDKOGA Notifier 2.0.0048.0PC FixerPower2Go 5.0QuickBooksQuickBooks Pro 2010QuickTimeREALTEK RTL8187 Wireless LAN DriverScanSecurity Update for Microsoft .NET Framework 3.5 SP1 (KB2604111)Security Update for Microsoft .NET Framework 3.5 SP1 (KB2736416)Security Update for Microsoft .NET Framework 3.5 SP1 (KB2840629)Security Update for Microsoft .NET Framework 3.5 SP1 (KB2861697)Security Update for Microsoft .NET Framework 4 Client Profile (KB2446708)Security Update for Microsoft .NET Framework 4 Client Profile (KB2478663)Security Update for Microsoft .NET Framework 4 Client Profile (KB2518870)Security Update for Microsoft .NET Framework 4 Client Profile (KB2539636)Security Update for Microsoft .NET Framework 4 Client Profile (KB2572078)Security Update for Microsoft .NET Framework 4 Client Profile (KB2604121)Security Update for Microsoft .NET Framework 4 Client Profile (KB2633870)Security Update for Microsoft .NET Framework 4 Client Profile (KB2656351)Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368)Security Update for Microsoft .NET Framework 4 Client Profile (KB2656368v2)Security Update for Microsoft .NET Framework 4 Client Profile (KB2656405)Security Update for Microsoft .NET Framework 4 Client Profile (KB2686827)Security Update for Microsoft .NET Framework 4 Client Profile (KB2729449)Security Update for Microsoft .NET Framework 4 Client Profile (KB2737019)Security Update for Microsoft .NET Framework 4 Client Profile (KB2742595)Security Update for Microsoft .NET Framework 4 Client Profile (KB2789642)Security Update for Microsoft .NET Framework 4 Client Profile (KB2804576)Security Update for Microsoft .NET Framework 4 Client Profile (KB2832407)Security Update for Microsoft .NET Framework 4 Client Profile (KB2835393)Security Update for Microsoft .NET Framework 4 Client Profile (KB2840628)Security Update for Microsoft .NET Framework 4 Client Profile (KB2840628v2)Security Update for Microsoft .NET Framework 4 Client Profile (KB2858302v2)Security Update for Microsoft .NET Framework 4 Client Profile (KB2861188)Security Update for Microsoft Office 2007 suites (KB2596744) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2596754) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2596792) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2596825) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2596871) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2597969) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2597973) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2687309) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2760411) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2760415) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2760585) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2760591) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2827326) 32-Bit EditionSecurity Update for Microsoft Office 2007 suites (KB2827329) 32-Bit EditionSecurity Update for Microsoft Office Excel 2007 (KB2827324) 32-Bit EditionSecurity Update for Microsoft Office InfoPath 2007 (KB2687440) 32-Bit EditionSecurity Update for Microsoft Office Outlook 2007 (KB2825644) 32-Bit EditionSecurity Update for Microsoft Office PowerPoint 2007 (KB2596764) 32-Bit EditionSecurity Update for Microsoft Office PowerPoint 2007 (KB2596912) 32-Bit EditionSecurity Update for Microsoft Office Word 2007 (KB2827330) 32-Bit EditionSigmaTel AudioSkinsSolutionCenterSpelling Dictionaries Support For Adobe Reader 8Spy SweeperStatusswMSMSynaptics Pointing Device DriverTexas Instruments PCIxx21/x515/xx12 drivers.TimeCurve Scheduler DemoTIPCIToolboxTrayAppUninstall 1.0.0.1UnloadSupportUpdate for 2007 Microsoft Office System (KB967642)Update for Microsoft .NET Framework 3.5 SP1 (KB963707)Update for Microsoft .NET Framework 4 Client Profile (KB2468871)Update for Microsoft .NET Framework 4 Client Profile (KB2533523)Update for Microsoft .NET Framework 4 Client Profile (KB2600217)Update for Microsoft .NET Framework 4 Client Profile (KB2836939)Update for Microsoft .NET Framework 4 Client Profile (KB2836939v3)Update for Microsoft Office 2007 Help for Common Features (KB963673)Update for Microsoft Office 2007 suites (KB2596620) 32-Bit EditionUpdate for Microsoft Office 2007 suites (KB2687493) 32-Bit EditionUpdate for Microsoft Office 2007 suites (KB2767849) 32-Bit EditionUpdate for Microsoft Office 2007 suites (KB2767916) 32-Bit EditionUpdate for Microsoft Office Excel 2007 Help (KB963678)Update for Microsoft Office OneNote 2007 Help (KB963670)Update for Microsoft Office Outlook 2007 (KB2687404) 32-Bit EditionUpdate for Microsoft Office Outlook 2007 Help (KB963677)Update for Microsoft Office Outlook 2007 Junk Email Filter (KB2825642) 32-Bit EditionUpdate for Microsoft Office Powerpoint 2007 Help (KB963669)Update for Microsoft Office Script Editor Help (KB963671)Update for Microsoft Office Word 2007 Help (KB963665)VC80CRTRedist - 8.0.50727.6195WebRegWebSlingPlayer ActiveXWidevine Media Transformer Plugin 5.0.0WModem Driver InstallerWondershare 1-Click PC Care (Version 7.5.0)Zip995.==== Event Viewer Messages From Past Week ========.12/1/2013 9:05:39 AM, Error: Microsoft-Windows-DistributedCOM [10016] - The application-specific permission settings do not grant Local Launch permission for the COM Server application with CLSID {C97FCC79-E628-407D-AE68-A06AD6D8B4D1} to the user NT AUTHORITY\SYSTEM SID (S-1-5-18) from address LocalHost (Using LRPC). This security permission can be modified using the Component Services administrative tool.12/1/2013 9:04:21 AM, Error: Microsoft-Windows-TaskScheduler [412] - Task Scheduler service failed to launch tasks triggered by computer startup. Additional Data: Error Value: 2147942402. User Action: restart task scheduler service.12/1/2013 9:03:28 AM, Error: volmgr [49] - Configuring the Page file for crash dump failed. Make sure there is a page file on the boot partition and that is large enough to contain all physical memory..==== End Of File =========================== Link to post Share on other sites
urtreasured Posted December 1, 2013 Author Report Share Posted December 1, 2013 RK Report RogueKiller V8.7.9 [Nov 25 2013] by Tigzymail : tigzyRK<at>gmail<dot>comFeedback : http://www.adlice.com/forum/Website : http://www.adlice.com/softwares/roguekiller/Blog : http://tigzyrk.blogspot.com/Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits versionStarted in : Normal modeUser : Owner [Admin rights]Mode : Scan -- Date : 12/01/2013 13:35:18| ARK || FAK || MBR |¤¤¤ Bad processes : 1 ¤¤¤[ZeroAccess][sERVICE] ???etadpug -- "C:\Program Files\Google\Desktop\Install\{e0d7cc16-5e05-1245-8340-5d9ba132bca1}\ \...\???ﯹ๛\{e0d7cc16-5e05-1245-8340-5d9ba132bca1}\GoogleUpdate.exe" < [x] -> STOPPED¤¤¤ Registry Entries : 0 ¤¤¤¤¤¤ Scheduled tasks : 0 ¤¤¤¤¤¤ Startup Entries : 0 ¤¤¤¤¤¤ Web browsers : 0 ¤¤¤¤¤¤ Particular Files / Folders: ¤¤¤¤¤¤ Driver : [LOADED] ¤¤¤[Address] SSDT[18] : NtAllocateVirtualMemory @ 0x82C8F6AD -> HOOKED (Unknown @ 0x85970370)[Address] SSDT[64] : NtCreateKey @ 0x82C36170 -> HOOKED (Unknown @ 0x859A7A78)[Address] SSDT[72] : NtCreateProcess @ 0x82CD8F95 -> HOOKED (Unknown @ 0x85970898)[Address] SSDT[73] : NtCreateProcessEx @ 0x82CD8FE0 -> HOOKED (Unknown @ 0x85970820)[Address] SSDT[78] : NtCreateThread @ 0x82CD8DC8 -> HOOKED (Unknown @ 0x85970640)[Address] SSDT[123] : NtDeleteKey @ 0x82BF9749 -> HOOKED (Unknown @ 0x85970AF0)[Address] SSDT[126] : NtDeleteValueKey @ 0x82BF4CEA -> HOOKED (Unknown @ 0x85970910)[Address] SSDT[255] : NtQueueApcThread @ 0x82BF8889 -> HOOKED (Unknown @ 0x859703E8)[Address] SSDT[261] : NtReadVirtualMemory @ 0x82C19A26 -> HOOKED (Unknown @ 0x859ABE98)[Address] SSDT[267] : NtRenameKey @ 0x82C9B88C -> HOOKED (Unknown @ 0x85970A78)[Address] SSDT[289] : NtSetContextThread @ 0x82CDA25F -> HOOKED (Unknown @ 0x859704D8)[Address] SSDT[303] : NtSetInformationKey @ 0x82C9AD35 -> HOOKED (Unknown @ 0x85970A00)[Address] SSDT[305] : NtSetInformationProcess @ 0x82C5B9EE -> HOOKED (Unknown @ 0x85970730)[Address] SSDT[306] : NtSetInformationThread @ 0x82C402DD -> HOOKED (Unknown @ 0x85970550)[Address] SSDT[324] : NtSetValueKey @ 0x82C253FF -> HOOKED (Unknown @ 0x85970988)[Address] SSDT[330] : NtSuspendProcess @ 0x82CDA6EF -> HOOKED (Unknown @ 0x859706B8)[Address] SSDT[331] : NtSuspendThread @ 0x82BE1945 -> HOOKED (Unknown @ 0x85970460)[Address] SSDT[334] : NtTerminateProcess @ 0x82C38173 -> HOOKED (Unknown @ 0x859707A8)[Address] SSDT[335] : NtTerminateThread @ 0x82C63670 -> HOOKED (Unknown @ 0x859705C8)[Address] SSDT[358] : NtWriteVirtualMemory @ 0x82C54A2F -> HOOKED (Unknown @ 0x859702F8)[Address] SSDT[383] : NtCreateUserProcess @ 0x82C10C47 -> HOOKED (Unknown @ 0x859ABE20)[Address] Shadow SSDT[317] : NtUserAttachThreadInput -> HOOKED (Unknown @ 0x88047F30)[Address] Shadow SSDT[397] : NtUserGetAsyncKeyState -> HOOKED (Unknown @ 0x8804F020)[Address] Shadow SSDT[428] : NtUserGetKeyboardState -> HOOKED (Unknown @ 0x88047EB8)[Address] Shadow SSDT[430] : NtUserGetKeyState -> HOOKED (Unknown @ 0x88047E40)[Address] Shadow SSDT[479] : NtUserMessageCall -> HOOKED (Unknown @ 0x86F98EB8)[Address] Shadow SSDT[497] : NtUserPostMessage -> HOOKED (Unknown @ 0x880601B8)[Address] Shadow SSDT[498] : NtUserPostThreadMessage -> HOOKED (Unknown @ 0x88047FA8)[Address] Shadow SSDT[573] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x86809E30)[Address] Shadow SSDT[576] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x87DD30E0)[inline] EAT @explorer.exe (FwDoNothingOnObject) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36772E66)[inline] EAT @explorer.exe (FwEnableMemTracing) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36772E66)[inline] EAT @explorer.exe (FwSetMemLeakPolicy) : FirewallAPI.dll -> HOOKED (Unknown @ 0x36772E66)¤¤¤ External Hives: ¤¤¤-> D:\windows\system32\config\SYSTEM | DRVINFO [Drv - D:] | SYSTEMINFO [sys - x:] [sys32 - FOUND] | USERINFO [startup - NOT_FOUND]-> D:\windows\system32\config\SOFTWARE | DRVINFO [Drv - D:] | SYSTEMINFO [sys - x:] [sys32 - FOUND] | USERINFO [startup - NOT_FOUND]-> D:\windows\system32\config\SECURITY | DRVINFO [Drv - D:] | SYSTEMINFO [sys - x:] [sys32 - FOUND] | USERINFO [startup - NOT_FOUND]-> D:\windows\system32\config\SAM | DRVINFO [Drv - D:] | SYSTEMINFO [sys - x:] [sys32 - FOUND] | USERINFO [startup - NOT_FOUND]-> D:\windows\system32\config\DEFAULT | DRVINFO [Drv - D:] | SYSTEMINFO [sys - x:] [sys32 - FOUND] | USERINFO [startup - NOT_FOUND]-> D:\Users\Default\NTUSER.DAT | DRVINFO [Drv - D:] | SYSTEMINFO [sys - x:] [sys32 - FOUND] | USERINFO [startup - NOT_FOUND]¤¤¤ Infection : ZeroAccess ¤¤¤¤¤¤ HOSTS File: ¤¤¤--> %SystemRoot%\System32\drivers\etc\hosts::1 localhost¤¤¤ MBR Check: ¤¤¤+++++ PhysicalDrive0: (\\.\PHYSICALDRIVE0 @ IDE) ST9160821A ATA Device +++++--- User ---[MBR] 31adc4f1c2c6f2b689e347e8abea5d72[bSP] 2129a2df68e4292f422b12295973d001 : Legit.B MBR CodePartition table:0 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 10150 Mo1 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 20788110 | Size: 142474 MoUser = LL1 ... OK!User = LL2 ... OK!Finished : << RKreport[0]_S_12012013_133518.txt >>RKreport[0]_D_12012013_133108.txt;RKreport[0]_S_12012013_132943.txt Link to post Share on other sites
flashh4 Posted December 2, 2013 Report Share Posted December 2, 2013 Untrusted i have some very bad news !! You are infected with "Zero Infection" !! One or more of the identified infections is related to a nasty rootkit component which is difficult to remove.Rootkits and backdoor Trojans are very dangerous because they use advanced techniques (backdoors) as ameans of accessing a computer system that bypasses security mechanisms and steal sensitive information which they send back to the hacker.Many rootkits can hook into the Windows 32-bit kernel, and patch several APIs to hide new registry keys and files they install. Remote attackers usebackdoor Trojans and rootkits as part of an exploit to gain unauthorized access to a computer and take control of it without your knowledge.If your computer was used for online banking, has credit card information or other sensitive data on it, you should immediately disconnectfrom the Internet until your system is cleaned. All passwords should be changed immediately to include those used forbanking, email, eBay, paypal and online forums from a CLEAN COMPUTER. You should consider them to be compromised.You should change each password by using a different computer and not the infected one. If not, an attacker may get thenew passwords and transaction information. If using a router, you need to reset it with a strong logon/password so themalware cannot gain control before connecting again. Banking and credit card institutions should be notified of the possible security breach.Although the rootkit has been identified and may be removed, your PC has likely been compromised and there isno way to be sure the computer can ever be trusted again. It is dangerous and incorrect to assume that because this malware has been removedthe computer is now secure. In some instances an infection may have caused so much damage to your system that it cannot be completelycleaned or repaired. The malware may leave so many remnants behind that security tools cannot find them. Many experts in the securitycommunity believe that once infected with this type of malware, the best course of action is to wipe the drive clean, delete the partition,reformat and reinstall the Operating System.'Should you decide not to follow this advice, i will do my best to help clean the computer of any infections but i cannot guarantee it to betrustworthy or that the removal will be successful. If you wish to proceed, disinfection will require more time and more advanced tools.Please let me know how you would like to proceed. I would wipe the system & reinstall it !! I cannot guarantee i can get it clean !! Chuck Link to post Share on other sites
urtreasured Posted December 2, 2013 Author Report Share Posted December 2, 2013 Well i have a few questions. First I do not do any banking or purchasing on this computer. What about all of my ms documents i.e. word, excell, pdfs? Then comes i do not even think I know or could find the original install cd's alot of the programs were already installed on the computer when i bought it. any thoughts? Link to post Share on other sites
flashh4 Posted December 2, 2013 Report Share Posted December 2, 2013 Thanks for posting this here so we can keep everything as a record here !Ok it's good that there is no banking done !We can try & clean this, i think we can clean this up pretty good, hopefully an all clean ! That sound good to you ? Chuck Link to post Share on other sites
urtreasured Posted December 2, 2013 Author Report Share Posted December 2, 2013 ok where do we start and do you want ot pick this up in the a.m. I have the next week off from work so i have time, have some appointments but we can work around them I think. Link to post Share on other sites
flashh4 Posted December 2, 2013 Report Share Posted December 2, 2013 All your ms documents i.e. word, excell, pdfs should be just fine, i will see them in some of the logs if they are infected !! Ok i be right back with a start of this bad infection !! I am retired so will be around all the time, mostly ! Chuck Link to post Share on other sites
flashh4 Posted December 2, 2013 Report Share Posted December 2, 2013 urtreasured, let get after this nasty thing !! Please download Farbar Recovery Scan Tool and save it to your Desktop. >>> http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/Note: You need to run the version compatible with your system. If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.You will need FRST64 * Right click to run as administrator (XP users click run after receipt of Windows Security Warning - Open File). When the tool opens click Yes to disclaimer. * Press Scan button. * It will produce a log called FRST.txt in the same directory the tool is run from. * Please copy and paste log back here. The first time the tool is run it generates another log (Addition.txt - also located in the same directory as FRST.exe/FRST64.exe). Please also paste that along with the FRST.txt into your reply. Post that log next, it will be long so you may have to break it up !! Chuck Link to post Share on other sites
Recommended Posts