61 infected files found with ESET Online Scanner

View previous topic View next topic Go down

61 infected files found with ESET Online Scanner

Post by aivlis on Tue 14 May 2013, 12:45 am

Hello. My computer had been acting funky so I ran the online scanner. I will include the text file of the infected files as well. Thank you.

ADWCleaner

# AdwCleaner v2.300 - Logfile created 05/13/2013 at 00:18:56
# Updated 28/04/2013 by Xplode
# Operating system : Windows 7 Professional Service Pack 1 (32 bits)
# User : User - USER-PC
# Boot Mode : Normal
# Running from : C:\Users\User\Downloads\adwcleaner.exe
# Option [Delete]


***** [Services] *****

Stopped & Deleted : SrvUpdater

***** [Files / Folders] *****

File Deleted : \END
Folder Deleted : C:\Program Files\AutoLyrics
Folder Deleted : C:\Program Files\DomaIQ Uninstaller
Folder Deleted : C:\Program Files\Iminent
Folder Deleted : C:\Program Files\SearchProtect
Folder Deleted : C:\Program Files\SweetIM
Folder Deleted : C:\Program Files\Yontoo
Folder Deleted : C:\ProgramData\APN
Folder Deleted : C:\ProgramData\Ask
Folder Deleted : C:\ProgramData\Babylon
Folder Deleted : C:\ProgramData\Tarma Installer
Folder Deleted : C:\Users\User\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkcdkfohdadbjmlfejhncigcbfkiaamf

***** [Registry] *****

Key Deleted : HKCU\Software\5e558bdeb76fe842
Key Deleted : HKCU\Software\APN PIP
Key Deleted : HKCU\Software\AppDataLow\Software\AutoLyrics
Key Deleted : HKCU\Software\AppDataLow\Software\Crossrider
Key Deleted : HKCU\Software\BabylonToolbar
Key Deleted : HKCU\Software\Cr_Installer
Key Deleted : HKCU\Software\DataMngr
Key Deleted : HKCU\Software\DataMngr_Toolbar
Key Deleted : HKCU\Software\Default Tab
Key Deleted : HKCU\Software\Iminent
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{EEE6C360-6118-11DC-9C72-001320C79847}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{000F18F2-09EB-4A59-82B2-5AE4184C39C3}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{44ED99E2-16A6-4B89-80D6-5B21CF42E78B}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{9E131A93-EED7-4BEB-B015-A0ADB30B5646}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{A6174F27-1FFF-E1D6-A93F-BA48AD5DD448}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{D824F0DE-3D60-4F57-9EB1-66033ECD8ABB}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{DAEB9E85-4694-4F9B-85CB-2F28987872D7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{F9E4A054-E9B1-4BC3-83A3-76A1AE736170}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{FD72061E-9FDE-484D-A58A-0BAB4151CAD8}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{00000000-6E41-4FD3-8538-502F5495E5FC}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DAEB9E85-4694-4F9B-85CB-2F28987872D7}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKCU\Software\pc optimizer pro
Key Deleted : HKCU\Software\Softonic
Key Deleted : HKCU\Software\wecarereminder
Key Deleted : HKLM\SOFTWARE\5e558bdeb76fe842
Key Deleted : HKLM\Software\Babylon
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{BDB69379-802F-4EAF-B541-F8DE92DD98DB}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{C26644C4-2A12-4CA6-8F2E-0EDE6CF018F3}
Key Deleted : HKLM\SOFTWARE\Classes\AppID\{C3110516-8EFC-49D6-8B72-69354F332062}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{02054E11-5113-4BE3-8153-AA8DFB5D3761}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{80922EE0-8A76-46AE-95D5-BD3C3FE0708D}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{D824F0DE-3D60-4F57-9EB1-66033ECD8ABB}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{DAEB9E85-4694-4F9B-85CB-2F28987872D7}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{FE9271F2-6EFD-44B0-A826-84C829536E93}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{021B4049-F57D-4565-A693-FD3B04786BFA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{0362AA09-808D-48E9-B360-FB51A8CBCE09}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{06844020-CD0B-3D3D-A7FE-371153013E49}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{0ADC01BB-303B-3F8E-93DA-12C140E85460}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{10D3722F-23E6-3901-B6C1-FF6567121920}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1675E62B-F911-3B7B-A046-EB57261212F3}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{192929F2-9273-3894-91B0-F54671C4C861}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2932897E-3036-43D9-8A64-B06447992065}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2DE92D29-A042-3C37-BFF8-07C7D8893EFA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{32B80AD6-1214-45F4-994E-78A5D482C000}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{3A8E103F-B2B7-3BEF-B3B0-88E29B2420E4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{478CE5D3-D38E-3FFE-8DBE-8C4A0F1C4D8D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{48B7DA4E-69ED-39E3-BAD5-3E3EFF22CFB0}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{5982F405-44E4-3BBB-BAC4-CF8141CBBC5C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{5D8C3CC3-3C05-38A1-B244-924A23115FE9}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{641593AF-D9FD-30F7-B783-36E16F7A2E08}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{711FC48A-1356-3932-94D8-A8B733DBC7E4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{72227B7F-1F02-3560-95F5-592E68BACC0C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{7B5E8CE3-4722-4C0E-A236-A6FF731BEF37}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{890D4F59-5ED0-3CB4-8E0E-74A5A86E7ED0}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8C68913C-AC3C-4494-8B9C-984D87C85003}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8D019513-083F-4AA5-933F-7D43A6DA82C4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{923F6FB8-A390-370E-A0D2-DD505432481D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9BBB26EF-B178-35D6-9D3D-B485F4279FE5}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A62DDBE0-8D2A-339A-B089-8CBCC5CD322A}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A82AD04D-0B8E-3A49-947B-6A69A8A9C96D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{ADEB3CC9-A05D-4FCC-BD09-9025456AA3EA}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{B06D4521-D09C-3F41-8E39-9D784CCA2A75}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C06DAD42-6F39-4CE1-83CC-9A8B9105E556}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C2E799D0-43A5-3477-8A98-FC5F3677F35C}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D16107CD-2AD5-46A8-BA59-303B7C32C500}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D25B101F-8188-3B43-9D85-201F372BC205}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D2BA7595-5E44-3F1E-880F-03B3139FA5ED}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D35F5C81-17D9-3E1C-A1FC-4472542E1D25}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D8FA96CA-B250-312C-AF34-4FF1DD72589D}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DAFC1E63-3359-416D-9BC2-E7DCA6F7B0F3}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{DC5E5C44-80FD-3697-9E65-9F286D92F3E7}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E1B4C9DE-D741-385F-981E-6745FACE6F01}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E7B623F5-9715-3F9F-A671-D1485A39F8A2}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{ED916A7B-7C68-3198-B87D-2DABC30A5587}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{EFA1BDB2-BB3D-3D9A-8EB5-D0D22E0F64F4}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F4CBF4DD-F8FE-35BA-BB7E-68304DAAB70B}
Key Deleted : HKLM\SOFTWARE\Classes\Interface\{FC32005D-E27C-32E0-ADFA-152F598B75E7}
Key Deleted : HKLM\SOFTWARE\Classes\Prod.cap
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{2BF2028E-3F3C-4C05-AB45-B2F1DCFE0759}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{DB538320-D3C5-433C-BCA9-C4081A054FCF}
Key Deleted : HKLM\Software\DataMngr
Key Deleted : HKLM\Software\Default Tab
Key Deleted : HKLM\Software\Freeze.com
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\ogccgbmabaphcakpiclgcnmcnimhokcj
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\pkcdkfohdadbjmlfejhncigcbfkiaamf
Key Deleted : HKLM\Software\Iminent
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{628F3201-34D0-49C0-BB9A-82A26AEFB291}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{68B81CCD-A80C-4060-8947-5AE69ED01199}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E6B969FB-6D33-48D2-9061-8BBD4899EB08}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{EEE6C360-6118-11DC-9C72-001320C79847}
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\apntoolbarinstaller_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\apntoolbarinstaller_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\Iminent_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\Iminent_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASAPI32
Key Deleted : HKLM\SOFTWARE\Microsoft\Tracing\MyBabylontb_RASMANCS
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{DAEB9E85-4694-4F9B-85CB-2F28987872D7}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{02478D38-C3F9-4EFB-9B51-7695ECA05670}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{EF99BD32-C1FB-11D2-892F-0090271D4F88}
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0238BBE24EA3A70408B81E4BB89C15E5
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\063A857434EDED11A893800002C0A966
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\29799DE249E7DBC459FC6C8F07EB8375
Key Deleted : HKLM\Software\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\F7652513C62FF63448CFF05163719DB7
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\autolyrics@man-soft.net
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SearchTheWebARP
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SoftwareUpdater
Key Deleted : HKLM\Software\pc optimizer pro
Key Deleted : HKLM\Software\PIP
Key Deleted : HKLM\Software\SoftwareUpdater
Key Deleted : HKLM\Software\Tarma Installer
Key Deleted : HKU\.DEFAULT\Software\Microsoft\Internet Explorer\SearchScopes\{0ECDF796-C2DC-4D79-A620-CCE0C0A66CC9}
Value Deleted : HKCU\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser [{EEE6C35B-6118-11DC-9C72-001320C79847}]

***** [Internet Browsers] *****

-\\ Internet Explorer v9.0.8112.16476

[OK] Registry is clean.

-\\ Google Chrome v26.0.1410.64

*************************

AdwCleaner[S1].txt - [11134 octets] - [13/05/2013 00:18:56]

########## EOF - C:\AdwCleaner[S1].txt - [11195 octets] ##########



MBAM

Malwarebytes Anti-Malware 1.75.0.1300
[You must be registered and logged in to see this link.]

Database version: v2013.05.08.01

Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 9.0.8112.16421
User :: USER-PC [administrator]

13/05/2013 12:23:42 a.m.
mbam-log-2013-05-13 (00-23-42).txt

Scan type: Full scan (C:\|)
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 301240
Time elapsed: 48 minute(s), 35 second(s)

Memory Processes Detected: 0
(No malicious items detected)

Memory Modules Detected: 0
(No malicious items detected)

Registry Keys Detected: 0
(No malicious items detected)

Registry Values Detected: 0
(No malicious items detected)

Registry Data Items Detected: 0
(No malicious items detected)

Folders Detected: 0
(No malicious items detected)

Files Detected: 0
(No malicious items detected)

(end)


SECURITY CHECK

Results of screen317's Security Check version 0.99.63
Windows 7 Service Pack 1 x86 (UAC is disabled!)
Internet Explorer 9
``````````````Antivirus/Firewall Check:``````````````
Windows Firewall Enabled!
Avira Desktop
Antivirus up to date! (On Access scanning disabled!)
`````````Anti-malware/Other Utilities Check:`````````
Malwarebytes Anti-Malware version 1.75.0.1300
Java 7 Update 21
Adobe Reader 10.1.6 Adobe Reader out of Date!
Google Chrome 26.0.1410.64
````````Process Check: objlist.exe by Laurent````````
Malwarebytes Anti-Malware mbam.exe
Avira Antivir avgnt.exe
Avira Antivir avguard.exe
`````````````````System Health check`````````````````
Total Fragmentation on Drive C: 0%
````````````````````End of Log``````````````````````

aivlis

Rookie Surfer
Rookie Surfer

Posts : 60
Joined : 2010-02-09
Operating System : Windows Vista

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by aivlis on Tue 14 May 2013, 12:46 am

ESET

C:\Users\All Users\APN\APN-Stub\W3IV6-G\APNIC.7z Win32/Bundled.Toolbar.Ask.B application
C:\Users\All Users\APN\APN-Stub\W3IV6-G\APNIC.dll Win32/Bundled.Toolbar.Ask.B application
C:\$Recycle.Bin\S-1-5-21-1349790792-3167326351-3411319240-1000\$R1Z722A.exe Win32/DomaIQ.C application cleaned by deleting - quarantined
C:\$Recycle.Bin\S-1-5-21-1349790792-3167326351-3411319240-1000\$RH1CSRR.exe a variant of Win32/ToolkitOffers.A application cleaned by deleting - quarantined
C:\$Recycle.Bin\S-1-5-21-1349790792-3167326351-3411319240-1000\$RI7QTTV.exe Win32/DomaIQ.C application cleaned by deleting - quarantined
C:\$Recycle.Bin\S-1-5-21-1349790792-3167326351-3411319240-1000\$ROJGA2F.exe a variant of Win32/Bundled.Toolbar.Ask.C application cleaned by deleting - quarantined
C:\Program Files\Avira\AntiVir Desktop\apnic.dll a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting (after the next restart) - quarantined
C:\Program Files\Avira\AntiVir Desktop\apntoolbarinstaller.exe a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting (after the next restart) - quarantined
C:\Program Files\SearchProtect\bin\cltmng.exe Win32/Conduit.SearchProtect.A application cleaned by deleting - quarantined
C:\Program Files\SearchProtect\bin\uninstall.exe Win32/Conduit.SearchProtect.A application cleaned by deleting - quarantined
C:\Program Files\SoftwareUpdater\uninstall.exe a variant of Win32/ToolkitOffers.A application cleaned by deleting - quarantined
C:\ProgramData\APN\APN-Stub\W3IV6-G\APNIC.7z Win32/Bundled.Toolbar.Ask.B application deleted - quarantined
C:\ProgramData\APN\APN-Stub\W3IV6-G\APNIC.dll Win32/Bundled.Toolbar.Ask.B application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PUXRWZUP\mp3rocket[1].exe a variant of Win32/Bundled.Toolbar.Ask.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GKG5QGLV\AresMod_ST[1].exe a variant of Win32/ToolkitOffers.A application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\ApnStub.exe a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\AskSLib.dll a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\cheE514.tmp Win32/ExFriendAlert.A application deleted - quarantined
C:\Users\User\AppData\Local\Temp\delta_2276248.exe a variant of Win32/Toolbar.Babylon.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\delta_2277784.exe a variant of Win32/Toolbar.Babylon.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\delta_2322425.exe a variant of Win32/Toolbar.Babylon.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\dp_2277784.exe a variant of Win32/DealPly.A application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\dp_2277877.exe a variant of Win32/DealPly.A application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\dp_2278959.exe a variant of Win32/DealPly.A application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\dp_2322425.exe a variant of Win32/DealPly.A application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\dp_2323687.exe a variant of Win32/DealPly.A application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\sfwr_2276248.exe a variant of Win32/ToolkitOffers.A application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\Shortcut_SweetIPacks.exe probably a variant of Win32/SweetIM.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\1B79A0AC-BAB0-7891-99B7-4C1870E40289\Setup.exe probably a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\21973388-BAB0-7891-A419-23E7BEF513B8\Latest\BExternal.dll a variant of Win32/Toolbar.Babylon.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\21973388-BAB0-7891-A419-23E7BEF513B8\Latest\IEHelper.dll Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\21973388-BAB0-7891-A419-23E7BEF513B8\Latest\Setup.exe a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\5F363A56-BAB0-7891-914A-7AE0C1BF7BA6\Setup.exe probably a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\9EED3014-BAB0-7891-9BE4-A710DE9803F7\Latest\BExternal.dll a variant of Win32/Toolbar.Babylon.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\9EED3014-BAB0-7891-9BE4-A710DE9803F7\Latest\IEHelper.dll Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\9EED3014-BAB0-7891-9BE4-A710DE9803F7\Latest\Setup.exe a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\C758A02E-BAB0-7891-96DC-11C63D7011F4\Latest\BExternal.dll a variant of Win32/Toolbar.Babylon.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\C758A02E-BAB0-7891-96DC-11C63D7011F4\Latest\IEHelper.dll Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\C758A02E-BAB0-7891-96DC-11C63D7011F4\Latest\Setup.exe a variant of Win32/Toolbar.Babylon.E application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\DIQ\FlashPlayer_151\setup__120.exe a variant of Win32/Amonetize.D application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\DIQ\FlashPlayer_151\software\speedupmypc.exe Win32/SpeedUpMyPC application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\DM\IAQaMxhlCCmnR2X\setup__120.exe a variant of Win32/Amonetize.D application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\DM\IAQaMxhlCCmnR2X\software\SweetIPacks.exe probably a variant of Win32/SweetIM.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\DM\JirmvmLGOsrxi1j\setup__120.exe a variant of Win32/Amonetize.D application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\nsh37D8.tmp\AskInstaller.exe a variant of Win32/Bundled.Toolbar.Ask.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\nsq7159.tmp\AskInstaller.exe a variant of Win32/Bundled.Toolbar.Ask.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\nsu5C2F.tmp\AskInstaller.exe a variant of Win32/Bundled.Toolbar.Ask.C application cleaned by deleting - quarantined
C:\Users\User\AppData\Local\Temp\nsx5F46.tmp\AskInstaller.exe a variant of Win32/Bundled.Toolbar.Ask.C application cleaned by deleting - quarantined
C:\Users\User\Documents\ApnStub.exe a variant of Win32/Bundled.Toolbar.Ask application cleaned by deleting - quarantined
C:\Users\User\Downloads\AVS Media Player (1).exe MSIL/Solimba.L application cleaned by deleting - quarantined
C:\Users\User\Downloads\AVS Media Player.exe MSIL/Solimba.L application cleaned by deleting - quarantined
C:\Users\User\Downloads\BestCodecsPaclSetup.exe a variant of Win32/InstallBrain.X application cleaned by deleting - quarantined
C:\Users\User\Downloads\FlashPlayer.exe Win32/DomaIQ.C application cleaned by deleting - quarantined
C:\Users\User\Downloads\FLV Media Player (1).exe MSIL/Solimba.L application cleaned by deleting - quarantined
C:\Users\User\Downloads\FLV Media Player.exe MSIL/Solimba.L application cleaned by deleting - quarantined
C:\Users\User\Downloads\MoonAV_d15173.exe probably a variant of Win32/InstallIQ application cleaned by deleting - quarantined
C:\Users\User\Downloads\MP3 Rocket.exe a variant of Win32/SoftonicDownloader.E application cleaned by deleting - quarantined
C:\Users\User\Downloads\mp3rocket.exe a variant of Win32/Bundled.Toolbar.Ask.C application cleaned by deleting - quarantined
C:\Users\User\Downloads\mplayer.exe probably a variant of Win32/InstallIQ application cleaned by deleting - quarantined
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly\UpdateProc\UpdateTask.exe a variant of Win32/DealPly.B application cleaned by deleting - quarantined
C:\Windows\Temp\itinstallerp.exe a variant of Win32/Vittalia.E application cleaned by deleting - quarantined

aivlis

Rookie Surfer
Rookie Surfer

Posts : 60
Joined : 2010-02-09
Operating System : Windows Vista

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by Superdave on Tue 14 May 2013, 5:12 am

Hello and welcome to GeekPolice.Net My name is Dave. I will be helping you out with your particular problem on your computer.

1. I will be working on your Malware issues. This may or may not solve other issues you have with your machine.
2. The fixes are specific to your problem and should only be used for this issue on this machine.
3. If you don't know or understand something, please don't hesitate to ask.
4. Please DO NOT run any other tools or scans while I am helping you.
5. It is important that you reply to this thread. Do not start a new topic.
6. Your security programs may give warnings for some of the tools I will ask you to use. Be assured, any links I give are safe.
7. Absence of symptoms does not mean that everything is clear.

If you can't access the internet with your infected computer you will have to download and transfer any programs to the computer you're using now and transfer them to the infected computer with a CD-RW or a USB storage device. I prefer a CD because a storage device can get infected. If you use a storage device hold the shift key down while inserting the USB storage device for about 10 secs. You will also have to transfer the logs you receive back to the good computer using the same method until we can get the computer back on-line.
*****************************************************************
Please download Junkware Removal Tool to your desktop.

Warning! Once the scan is complete JRT will shut down your browser with NO warning.

Shut down your protection software now to avoid potential conflicts.

•Temporarily disable your Antivirus and any Antispyware real time protection before performing a scan. Click this link to see a list of security programs that should be disabled and how to disable them.

•Run the tool by double-clicking it. If you are using Windows Vista or Windows 7, right-click JRT and select Run as Administrator

•The tool will open and start scanning your system.

•Please be patient as this can take a while to complete depending on your system's specifications.

•On completion, a log (JRT.txt) is saved to your desktop and will automatically open.

•Copy and Paste the JRT.txt log into your next message.
***********************************************
The Security log shows that your AV is disabled. If this is so, please enable it.

Update your Adobe Reader. get.adobe.com/reader.

Be sure to uncheck the Free McAfee Security Scan so it isn't installed.

******************************************
Download Combofix from any of the links below, and save it to your DESKTOP.
If your version of Windows defaults to you download folder you will need to copy it to your desktop.

Link 1
Link 2
Link 3

To prevent your anti-virus application interfering with ComboFix we need to disable it. See here for a tutorial regarding how to do so if you are unsure.

  • Close any open windows and double click ComboFix.exe to run it.

    You will see the following image:



Click I Agree to start the program.

ComboFix will then extract the necessary files and you will see this:



As part of it's process, ComboFix will check to see if the Microsoft Windows Recovery Console is installed. With malware infections being as they are today, it's strongly recommended to have this pre-installed on your machine before doing any malware removal. This will not occur in Windows Vista and 7

It will allow you to boot up into a special recovery/repair mode that will allow us to more easily help you should your computer have a problem after an attempted removal of malware.

If you did not have it installed, you will see the prompt below. Choose YES.



Follow the prompts to allow ComboFix to download and install the Microsoft Windows Recovery Console, and when prompted, agree to the End-User License Agreement to install the Microsoft Windows Recovery Console.

**Please note: If the Microsoft Windows Recovery Console is already installed, ComboFix will continue it's malware removal procedures.

Once the Microsoft Windows Recovery Console is installed using ComboFix, you should see the following message:



Click on Yes, to continue scanning for malware.

When finished, it will produce a report for you. Please post the contents of the log (C:\ComboFix.txt).

Leave your computer alone while ComboFix is running. ComboFix will restart your computer if malware is found; allow it to do so.

Note: Please Do NOT mouseclick combofix's window while its running because it may cause it to stall.

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by aivlis on Tue 14 May 2013, 2:50 pm

JRT

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 4.9.4 (05.06.2013:1)
OS: Windows 7 Professional x86
Ran by User on 13/05/2013 at 22:30:55.38
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Registry Values

Successfully deleted: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\smessaging
Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main\\Start Page



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\sweetim
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\sweetim
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{70830CF2-4FB2-4B67-935C-E5B0CD9DF145}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9052A326-0416-4176-A23F-1405A3580E13}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9a216821-0ec5-49a3-85ac-fb72ae79a1e8}
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{A101EA6D-2B4A-4B6C-A9CF-A66ADF554EBE}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9a216821-0ec5-49a3-85ac-fb72ae79a1e8}



~~~ Files

Successfully deleted: [File] "C:\Windows\system32\roboot.exe"



~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\pc optimizer pro"
Successfully deleted: [Folder] "C:\Users\User\AppData\Roaming\babylon"
Successfully deleted: [Folder] "C:\Users\User\AppData\Roaming\performersoft"
Successfully deleted: [Folder] "C:\Users\User\AppData\Roaming\searchprotect"
Successfully deleted: [Folder] "C:\Users\User\AppData\Roaming\strongvault"
Successfully deleted: [Folder] "C:\Users\User\appdata\local\filmfanatic"
Successfully deleted: [Folder] "C:\Users\User\appdata\local\iac"
Successfully deleted: [Folder] "C:\Users\User\appdata\local\stronghold_llc"
Successfully deleted: [Folder] "C:\Users\User\appdata\local\strongvault online backup"
Successfully deleted: [Folder] "C:\Users\User\appdata\locallow\claro ltd"
Successfully deleted: [Folder] "C:\Users\User\appdata\locallow\conduit"
Successfully deleted: [Folder] "C:\Users\User\appdata\locallow\delta"
Successfully deleted: [Folder] "C:\Users\User\appdata\locallow\filmfanatic"
Successfully deleted: [Folder] "C:\Users\User\appdata\locallow\iac"
Successfully deleted: [Folder] "C:\Users\User\appdata\locallow\wiseconvert_b"
Successfully deleted: [Folder] "C:\Program Files\filmfanatic"
Successfully deleted: [Folder] "C:\Program Files\iminent"
Successfully deleted: [Folder] "C:\Program Files\infoatoms"
Successfully deleted: [Folder] "C:\Program Files\pc optimizer pro"
Successfully deleted: [Folder] "C:\Program Files\savepath deals"
Successfully deleted: [Folder] "C:\Program Files\wiseconvert_b"
Successfully deleted: [Folder] "C:\Windows\system32\ai_recyclebin"
Successfully deleted: [Folder] "C:\ai_recyclebin"



~~~ Event Viewer Logs were cleared





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 13/05/2013 at 22:32:15.09
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


COMBOFIX

ComboFix 13-05-13.01 - User 13/05/2013 22:39:52.1.2 - x86
Microsoft Windows 7 Professional 6.1.7601.1.1252.1.1033.18.3062.1806 [GMT -5:00]
Running from: c:\users\User\Downloads\ComboFix.exe
AV: Avira Desktop *Disabled/Updated* {F67B4DE5-C0B4-6C3F-0EFF-6C83BD5D0C2C}
SP: Avira Desktop *Disabled/Updated* {4D1AAC01-E68E-63B1-344F-57F1C6DA4691}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
* Created a new restore point
.
.
((((((((((((((((((((((((( Files Created from 2013-04-14 to 2013-05-14 )))))))))))))))))))))))))))))))
.
.
2013-05-14 03:46 . 2013-05-14 03:46 -------- d-----w- c:\users\Default\AppData\Local\temp
2013-05-14 03:46 . 2013-05-14 03:46 -------- d-----w- c:\windows\system32\config\systemprofile\AppData\Local\temp
2013-05-14 03:36 . 2013-05-14 03:36 -------- d-----w- c:\program files\Common Files\Adobe
2013-05-14 03:30 . 2013-05-14 03:30 -------- d-----w- c:\windows\ERUNT
2013-05-14 03:30 . 2013-05-14 03:30 -------- d-----w- C:\JRT
2013-05-13 04:29 . 2013-05-13 04:29 -------- d-----w- c:\program files\ESET
2013-05-08 04:57 . 2009-06-25 21:58 48128 ----a-w- c:\windows\system32\drivers\rimmptsk.sys
2013-05-08 04:57 . 2009-06-25 21:25 38400 ----a-w- c:\windows\system32\drivers\rixdptsk.sys
2013-05-08 04:57 . 2009-06-25 21:10 44544 ----a-w- c:\windows\system32\drivers\rimsptsk.sys
2013-05-08 04:57 . 2007-07-25 17:48 172032 ----a-w- c:\windows\system32\rixdicon.dll
2013-05-08 04:52 . 2013-05-08 04:52 66656 ----a-w- c:\windows\system32\drivers\avnetflt.sys
2013-05-08 04:52 . 2013-05-08 04:52 -------- d-----w- c:\users\User\AppData\Roaming\Avira
2013-05-08 04:51 . 2013-05-08 04:51 -------- d-----w- c:\windows\system32\config\systemprofile\AppData\Local\IAC
2013-05-08 04:51 . 2013-05-08 04:51 -------- d-----w- c:\windows\system32\config\systemprofile\AppData\Local\FromDocToPDF_65
2013-05-08 04:49 . 2013-05-08 04:49 -------- d-----w- c:\windows\Sun
2013-05-08 04:48 . 2013-05-08 04:48 84744 ----a-w- c:\windows\system32\drivers\avgntflt.sys
2013-05-08 04:48 . 2013-05-08 04:48 37352 ----a-w- c:\windows\system32\drivers\avkmgr.sys
2013-05-08 04:48 . 2013-05-08 04:48 135136 ----a-w- c:\windows\system32\drivers\avipbb.sys
2013-05-08 04:48 . 2013-05-08 04:48 -------- d-----w- c:\programdata\Avira
2013-05-08 04:48 . 2013-05-08 04:48 -------- d-----w- c:\program files\Avira
2013-05-08 04:47 . 2013-05-08 04:47 -------- d-----w- c:\program files\Common Files\Java
2013-05-08 04:47 . 2013-05-08 04:47 866720 ----a-w- c:\windows\system32\npDeployJava1.dll
2013-05-08 04:47 . 2013-05-08 04:47 788896 ----a-w- c:\windows\system32\deployJava1.dll
2013-05-08 04:47 . 2013-05-08 04:47 94112 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2013-05-08 04:47 . 2013-05-08 04:47 -------- d-----w- c:\program files\Java
2013-05-08 04:45 . 2013-05-08 04:45 -------- d-----w- c:\programdata\McAfee
2013-05-08 04:15 . 2013-05-08 04:15 -------- d-----w- c:\users\User\AppData\Roaming\Malwarebytes
2013-05-08 04:15 . 2013-05-08 04:15 -------- d-----w- c:\programdata\Malwarebytes
2013-05-08 04:15 . 2013-05-08 04:15 -------- d-----w- c:\program files\Malwarebytes' Anti-Malware
2013-05-08 04:15 . 2013-04-04 19:50 22856 ----a-w- c:\windows\system32\drivers\mbam.sys
2013-04-21 05:02 . 2013-05-13 04:23 -------- d-----w- c:\users\User\AppData\Local\ElevatedDiagnostics
2013-04-21 05:00 . 2013-04-21 05:00 -------- d-----w- c:\program files\Common Files\Skype
2013-04-21 04:25 . 2013-04-21 04:43 -------- d--h--w- c:\windows\msdownld.tmp
2013-04-17 23:11 . 2013-05-08 04:12 -------- d-----w- c:\programdata\DnsBasic
2013-04-17 23:11 . 2013-04-17 23:11 -------- d-----w- c:\program files\DnsBasic
2013-04-17 12:53 . 2013-05-07 14:26 -------- d-----w- c:\program files\MyPC Backup
2013-04-17 12:50 . 2013-04-17 12:50 -------- d-----w- c:\users\User\AppData\Local\Programs
.
.
.
(((((((((((((((((((((((((((((((((((((((( Find3M Report ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2013-03-17 17:38 . 2012-12-03 04:06 693976 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2013-03-17 17:38 . 2012-11-06 18:37 73432 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2013-02-22 01:37 . 2013-02-22 01:37 40136 ----a-w- c:\windows\system32\drivers\hssdrv6.sys
.
.
------- Sigcheck -------
Note: Unsigned files aren't necessarily malware.
.
[-] 2012-11-06 . 7BD7F45FF37FA0669CD32CA0EF46E22C . 811520 . . [6.1.7601.17514] . . c:\windows\System32\user32.dll
[7] 2010-11-20 . F1DD3ACAEE5E6B4BBC69BC6DF75CEF66 . 811520 . . [6.1.7601.17514] . . c:\windows\winsxs\x86_microsoft-windows-user32_31bf3856ad364e35_6.1.7601.17514_none_cf3fd62ccb9e983d\user32.dll
.
((((((((((((((((((((((((((((((((((((( Reg Loading Points ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown
REGEDIT4
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Skype"="c:\program files\Skype\Phone\Skype.exe" [2013-02-28 18642024]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2009-09-24 141848]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2009-09-24 173592]
"Persistence"="c:\windows\system32\igfxpers.exe" [2009-09-24 150552]
"OEM02Mon.exe"="c:\windows\OEM02Mon.exe" [2007-05-09 36864]
"Dell Webcam Central"="c:\program files\Dell Webcam\Dell Webcam Central\WebcamDell2.exe" [2009-06-24 409744]
"GrooveMonitor"="c:\program files\Microsoft Office\Office12\GrooveMonitor.exe" [2006-10-27 31016]
"APSDaemon"="c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe" [2013-01-28 59720]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2013-02-20 152392]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-03-12 253816]
"avgnt"="c:\program files\Avira\AntiVir Desktop\avgnt.exe" [2013-05-08 345312]
"Adobe ARM"="c:\program files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" [2012-12-18 946352]
.
c:\users\User\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\
OneNote 2007 Screen Clipper and Launcher.lnk - c:\program files\Microsoft Office\Office12\ONENOTEM.EXE [2006-10-26 98632]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"ConsentPromptBehaviorAdmin"= 0 (0x0)
"ConsentPromptBehaviorUser"= 3 (0x3)
"EnableLUA"= 0 (0x0)
"EnableUIADesktopToggle"= 0 (0x0)
"PromptOnSecureDesktop"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\drivers32]
"aux1"=wdmaud.drv
.
R2 msav;Moon Secure Antivirus Core;c:\program files\Moon Secure Antivirus\msavcore.exe [x]
R2 SkypeUpdate;Skype Updater;c:\program files\Skype\Updater\Updater.exe [x]
R3 CtAudDrv;Provides advanced audio effects for audio devices.;c:\windows\system32\Drivers\CtAudDrv.sys [x]
R3 dmvsc;dmvsc;c:\windows\system32\drivers\dmvsc.sys [x]
R3 taphss6;Anchorfree HSS VPN Adapter;c:\windows\system32\DRIVERS\taphss6.sys [x]
R3 TsUsbFlt;TsUsbFlt;c:\windows\system32\drivers\tsusbflt.sys [x]
R3 TsUsbGD;Remote Desktop Generic USB Device;c:\windows\system32\drivers\TsUsbGD.sys [x]
R3 WatAdminSvc;Windows Activation Technologies Service;c:\windows\system32\Wat\WatAdminSvc.exe [x]
S1 avkmgr;avkmgr;c:\windows\system32\DRIVERS\avkmgr.sys [x]
S2 AntiVirSchedulerService;Avira Scheduler;c:\program files\Avira\AntiVir Desktop\sched.exe [x]
S3 CtClsFlt;Creative Camera Class Upper Filter Driver;c:\windows\system32\DRIVERS\CtClsFlt.sys [x]
S3 SrvHsfHDA;SrvHsfHDA;c:\windows\system32\DRIVERS\VSTAZL3.SYS [x]
S3 SrvHsfV92;SrvHsfV92;c:\windows\system32\DRIVERS\VSTDPV3.SYS [x]
S3 SrvHsfWinac;SrvHsfWinac;c:\windows\system32\DRIVERS\VSTCNXT3.SYS [x]
S3 yukonw7;NDIS6.2 Miniport Driver for Marvell Yukon Ethernet Controller;c:\windows\system32\DRIVERS\yk62x86.sys [x]
.
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2013-05-08 14:02 1642448 ----a-w- c:\program files\Google\Chrome\Application\26.0.1410.64\Installer\chrmstp.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{A509B1FF-37FF-4bFF-8CFF-4F3A747040FF}]
2009-07-14 01:14 126464 ----a-w- c:\windows\System32\advpack.dll
.
Contents of the 'Scheduled Tasks' folder
.
2013-05-14 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2012-12-03 17:38]
.
2013-05-13 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-05-08 14:00]
.
2013-05-14 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2013-05-08 14:00]
.
.
------- Supplementary Scan -------
.
uStart Page = [You must be registered and logged in to see this link.]
mStart Page = [You must be registered and logged in to see this link.]
uInternet Settings,ProxyOverride = *.local
IE: E&xport to Microsoft Excel - c:\progra~1\MICROS~1\Office12\EXCEL.EXE/3000
TCP: DhcpNameServer = 209.18.47.61 209.18.47.62
.
- - - - ORPHANS REMOVED - - - -
.
URLSearchHooks-{81017EA9-9AA8-4A6A-9734-7AF40E7D593F} - (no file)
HKCU-Run-ares mod - c:\program files\AresMod\AresMod.exe
HKLM-Run-ShopAtHomeWatcher - c:\users\User\AppData\Roaming\ShopAtHome\ShopAtHomeHelper\ShopAtHomeWatcher.exe
AddRemove-InfoAtoms - c:\program files\InfoAtoms\Uninstall.exe
.
.
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\PCW\Security]
@Denied: (Full) (Everyone)
.
Completion time: 2013-05-13 22:48:59
ComboFix-quarantined-files.txt 2013-05-14 03:48
.
Pre-Run: 288,853,450,752 bytes free
Post-Run: 288,951,189,504 bytes free
.
- - End Of File - - B8F0E2ACCCA902DAAE4204C4DCE2C5CA

aivlis

Rookie Surfer
Rookie Surfer

Posts : 60
Joined : 2010-02-09
Operating System : Windows Vista

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by Superdave on Wed 15 May 2013, 9:27 am

SysProt Antirootkit

Download
SysProt Antirootkit from the link below (you will find it at the bottom
of the page under attachments, or you can get it from one of the
mirrors).

[You must be registered and logged in to see this link.]

Unzip it into a folder on your desktop.

  • Double click Sysprot.exe to start the program.
  • Click on the Log tab.
  • In the Write to log box select the following items.

    • Process << Selected
    • Kernel Modules << Selected
    • SSDT << Selected
    • Kernel Hooks << Selected
    • IRP Hooks << NOT Selected
    • Ports << NOT Selected
    • Hidden Files << Selected

  • At the bottom of the page

    • Hidden Objects Only << Selected

  • Click on the Create Log button on the bottom right.
  • After a few seconds a new window should appear.
  • Select Scan Root Drive. Click on the Start button.
  • When it is complete a new window will appear to indicate that the scan is finished.
  • The log will be saved automatically in the same folder Sysprot.exe was extracted to. Open the text file and copy/paste the log here.

*******************************************

  • Download RogueKiller on the desktop
  • Close all the running programs
  • Windows Vista/7 users: right click on RogueKiller.exe, click Run as Administrator
  • Otherwise just double-click on RogueKiller.exe
  • Pre-scan will start. Let it finish.
  • Click on SCAN button.
  • A report (RKreport.txt) should open. Post its content in your next reply. (RKreport could also be found on your desktop)
  • If RogueKiller has been blocked, do not hesitate to try a few times more. If really won't run, rename it to winlogon.exe (or winlogon.com) and try again


Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by aivlis on Wed 15 May 2013, 2:37 pm

SYSPROT

SysProt AntiRootkit v1.0.1.0
by swatkat

******************************************************************************************
******************************************************************************************

No Hidden Processes found

******************************************************************************************
******************************************************************************************
Kernel Modules:
Module Name: \SystemRoot\System32\Drivers\dump_dumpata.sys
Service Name: ---
Module Base: 9579A000
Module End: 957A5000
Hidden: Yes

Module Name: \SystemRoot\System32\Drivers\dump_atapi.sys
Service Name: ---
Module Base: 957A5000
Module End: 957AE000
Hidden: Yes

Module Name: \SystemRoot\System32\Drivers\dump_dumpfve.sys
Service Name: ---
Module Base: 957AE000
Module End: 957BF000
Hidden: Yes

******************************************************************************************
******************************************************************************************
No SSDT Hooks found

******************************************************************************************
******************************************************************************************
No Kernel Hooks found

******************************************************************************************
******************************************************************************************
Hidden files/folders:
Object: C:\Qoobox\BackEnv\AppData.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Cache.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Cookies.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Desktop.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Favorites.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\History.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\LocalAppData.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\LocalSettings.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Music.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\NetHood.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Personal.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Pictures.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\PrintHood.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Profiles.Folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Profiles.Folder.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Programs.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Recent.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\SendTo.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\SetPath.bat
Status: Access denied

Object: C:\Qoobox\BackEnv\StartMenu.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\StartUp.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\SysPath.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\Templates.folder.dat
Status: Access denied

Object: C:\Qoobox\BackEnv\VikPev00
Status: Access denied

Object: C:\System Volume Information\WindowsImageBackup\SPPMetadataCache
Status: Access denied

Object: C:\Windows\CSC\v2.0.6\namespace
Status: Access denied

Object: C:\Windows\CSC\v2.0.6\pq
Status: Access denied

Object: C:\Windows\CSC\v2.0.6\sm
Status: Access denied

Object: C:\Windows\CSC\v2.0.6\temp
Status: Access denied

Object: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTDiagLog.etl
Status: Access denied

Object: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-Application.etl
Status: Access denied

Object: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventlog-Security.etl
Status: Access denied

Object: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTEventLog-System.etl
Status: Access denied

Object: C:\Windows\System32\LogFiles\WMI\RtBackup\EtwRTUBPM.etl
Status: Access denied


RKreport

RogueKiller V8.5.4 [Mar 18 2013] by Tigzy
mail : tigzyRKgmailcom
Feedback : [You must be registered and logged in to see this link.]
Website : [You must be registered and logged in to see this link.]
Blog : [You must be registered and logged in to see this link.]

Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Started in : Normal mode
User : User [Admin rights]
Mode : Scan -- Date : 05/14/2013 22:36:20
| ARK || FAK || MBR |

¤¤¤ Bad processes : 1 ¤¤¤
[SUSP PATH] SysProt.exe -- C:\Users\User\Desktop\SysProt\SysProt\SysProt.exe [-] -> KILLED [TermProc]

¤¤¤ Registry Entries : 10 ¤¤¤
[RUN][SUSP PATH] HKCU\[...]\RunOnce : SpUninstallDeleteDir (rmdir /s /q "C:\Users\User\AppData\Roaming\SearchProtect") [x] -> FOUND
[RUN][SUSP PATH] HKUS\S-1-5-21-1349790792-3167326351-3411319240-1000[...]\RunOnce : SpUninstallDeleteDir (rmdir /s /q "C:\Users\User\AppData\Roaming\SearchProtect") [x] -> FOUND
[TASK][SUSP PATH] DealPly : C:\Windows\system32\config\SYSTEM~1\AppData\Roaming\DealPly\UPDATE~1\UPDATE~1.EXE /Check [x] -> FOUND
[TASK][SUSP PATH] Test TimeTrigger : C:\Users\User\AppData\Local\Temp\Runner.exe C:\Users\User\AppData\Local\Temp\DNS.exe [x] -> FOUND
[HJPOL] HKLM\[...]\System : DisableRegistryTools (0) -> FOUND
[HJ] HKLM\[...]\System : ConsentPromptBehaviorAdmin (0) -> FOUND
[HJ] HKLM\[...]\System : EnableLUA (0) -> FOUND
[HJ SMENU] HKCU\[...]\Advanced : Start_ShowMyGames (0) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
[HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

¤¤¤ Particular Files / Folders: ¤¤¤

¤¤¤ Driver : [LOADED] ¤¤¤
SSDT[84] : NtCreateSection @ 0x82E62F2B -> HOOKED (Unknown @ 0x903E0CB6)
SSDT[299] : NtRequestWaitReplyPort @ 0x82E7D8D9 -> HOOKED (Unknown @ 0x903E0CC0)
SSDT[316] : NtSetContextThread @ 0x82F1CCFF -> HOOKED (Unknown @ 0x903E0CBB)
SSDT[347] : NtSetSecurityObject @ 0x82E41626 -> HOOKED (Unknown @ 0x903E0CC5)
SSDT[368] : NtSystemDebugControl @ 0x82EC5464 -> HOOKED (Unknown @ 0x903E0CCA)
SSDT[370] : NtTerminateProcess @ 0x82E9A9BF -> HOOKED (Unknown @ 0x903E0C57)
S_SSDT[585] : NtUserSetWindowsHookEx -> HOOKED (Unknown @ 0x903E0CDE)
S_SSDT[588] : NtUserSetWinEventHook -> HOOKED (Unknown @ 0x903E0CE3)

¤¤¤ HOSTS File: ¤¤¤
--> C:\Windows\system32\drivers\etc\hosts



¤¤¤ MBR Check: ¤¤¤

+++++ PhysicalDrive0: ST9320325AS ATA Device +++++
--- User ---
[MBR] f12c7140acf8a2e0b3ed3e92b4e75502
[BSP] 454a26b4601d8ab1a62e603586304914 : Windows 7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 2048 | Size: 100 Mo
1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 206848 | Size: 305143 Mo
User = LL1 ... OK!
User = LL2 ... OK!

Finished : << RKreport[1]_S_05142013_02d2236.txt >>
RKreport[1]_S_05142013_02d2236.txt




aivlis

Rookie Surfer
Rookie Surfer

Posts : 60
Joined : 2010-02-09
Operating System : Windows Vista

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by Superdave on Wed 15 May 2013, 11:56 pm

Please run RogueKiller and delete those items.

I'd like to scan your machine with ESET OnlineScan

•Hold down Control and click on the following link to open ESET OnlineScan in a new window.
ESET OnlineScan

•Click the button.
•For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

  • Click on to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the icon on your desktop.

•Check
•Click the button.
•Accept any security warnings from your browser.

  • Leave the check mark next to Remove found threats.

•Check
•Push the Start button.
•ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
•When the scan completes, push
•Push , and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
•Push the button.
•Push
A log file will be saved here: C:\Program Files\ESET\ESET Online Scanner\log.txt

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by aivlis on Thu 16 May 2013, 6:39 am

There were no threats found; it did not produce a .txt file for me.

aivlis

Rookie Surfer
Rookie Surfer

Posts : 60
Joined : 2010-02-09
Operating System : Windows Vista

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by Superdave on Thu 16 May 2013, 10:41 am

Good. How's your computer running now?

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by aivlis on Thu 16 May 2013, 10:49 am

Its running about a million times better. Did we get everything?

aivlis

Rookie Surfer
Rookie Surfer

Posts : 60
Joined : 2010-02-09
Operating System : Windows Vista

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by Superdave on Thu 16 May 2013, 11:47 am

Did we get everything?
No one can be 100% certain but I'm quite sure we got all of it. Let's do some cleanup.

Download this program and run it Uninstall ComboFix .It will remove ComboFix for you.

******************************************
Click Start> Computer> right click the C Drive and choose Properties> enter
Click Disk Cleanup from there.



Click OK on the Disk Cleanup Screen.
Click Yes on the Confirmation screen.



This runs the Disk Cleanup utility along with other selections if you have chosen any. (if you had a lot System Restore points, you will see a significant change in the free space in C drive)
******************************************
Go to Microsoft Windows Update and get all critical updates.

----------

I suggest using WOT - Web of Trust. WOT is a free Internet security addon for your browser. It will keep you safe from online scams, identity theft, spyware, spam, viruses and unreliable shopping sites. WOT warns you before you interact with a risky website. It's easy and it's free.

SpywareBlaster- Secure your Internet Explorer to make it harder for ActiveX programs to run on your computer. Also stop certain cookies from being added to your computer when running Mozilla based browsers like Firefox.
* Using SpywareBlaster to protect your computer from Spyware and Malware
* If you don't know what ActiveX controls are, see here

Protect yourself against spyware using the Immunize feature in Spybot - Search & Destroy. Guide: Use Spybot's Immunize Feature to prevent spyware infection in real-time. Note: To ensure you have the latest Immunizations always update Spybot - Search & Destroy before Immunizing. Spybot - Search & Destroy FAQ

Check out Keeping Yourself Safe On The Web for tips and free tools to help keep you safe in the future.

Also see Slow Computer? It may not be Malware for free cleaning/maintenance tools to help keep your computer running smoothly.
Safe Surfing!

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by aivlis on Thu 16 May 2013, 1:11 pm

Thanks for the help!

aivlis

Rookie Surfer
Rookie Surfer

Posts : 60
Joined : 2010-02-09
Operating System : Windows Vista

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by Superdave on Fri 17 May 2013, 4:42 am

You're welcome. I will lock this thread. If you need it re-opened, please send me a pm.

Superdave
Tech Staff


Tech Staff

Posts : 4193
Joined : 2010-02-01
Operating System : Windows 8.1 and a dual-boot with XP Home SP3

View user profile

Back to top Go down

Re: 61 infected files found with ESET Online Scanner

Post by Sponsored content Today at 9:36 am


Sponsored content


Back to top Go down

View previous topic View next topic Back to top


 
Permissions in this forum:
You cannot reply to topics in this forum