Hi again,
I was wondering if you had given up on me, luckily not yet
I downloaded and ran RogueKiller and the report is bellow.
Thanks
-----------------
RogueKiller V10.0.8.0 [Nov 20 2014] by Adlice Software
Operating System : Windows 7 (6.1.7601 Service Pack 1) 32 bits version
Started in : Normal mode
User : Suzie [Administrator]
Mode : Scan -- Date : 12/01/2014 05:12:05
¤¤¤ Processes : 1 ¤¤¤
[Suspicious.Path] Nike+ Connect daemon.exe -- C:\Users\Suzie\AppData\Local\Nike\Nike+ Connect\Nike+ Connect daemon.exe[-] -> Killed [TermProc]
¤¤¤ Registry : 16 ¤¤¤
[PUP] HKEY_CLASSES_ROOT\CLSID\{1AA60054-57D9-4F99-9A55-D0FBFBE7ECD3} -> Found
[PUP] HKEY_CLASSES_ROOT\CLSID\{5A4E3A41-FA55-4BDA-AED7-CEBE6E7BCB52} -> Found
[Suspicious.Path] HKEY_USERS\S-1-5-21-3823719251-145347726-1436220222-1000\Software\Microsoft\Windows\CurrentVersion\Run | Nike+ Connect : "C:\Users\Suzie\AppData\Local\Nike\Nike+ Connect\Nike+ Connect daemon.exe" -> Found
[PUM.HomePage] HKEY_USERS\S-1-5-21-3823719251-145347726-1436220222-1000\Software\Microsoft\Internet Explorer\Main | Start Page :
http://www.uol.com.br/ -> Found
[PUM.Dns] HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{AC490675-FD03-45B5-B4CC-25DF0BFE305F} | DhcpNameServer : 172.20.10.1 [(Private Address) (XX)] -> Found
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{AC490675-FD03-45B5-B4CC-25DF0BFE305F} | DhcpNameServer : 172.20.10.1 [(Private Address) (XX)] -> Found
[PUM.Dns] HKEY_LOCAL_MACHINE\System\ControlSet002\Services\Tcpip\Parameters\Interfaces\{AC490675-FD03-45B5-B4CC-25DF0BFE305F} | DhcpNameServer : 172.20.10.1 [(Private Address) (XX)] -> Found
[PUM.Policies] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System | ConsentPromptBehaviorAdmin : 0 -> Found
[PUM.StartMenu] HKEY_USERS\S-1-5-21-3823719251-145347726-1436220222-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced | Start_ShowRun : 0 -> Found
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Found
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Found
¤¤¤ Tasks : 7 ¤¤¤
[Suspicious.Path] \\{01772589-0850-4154-BD84-C564A5A7C835} -- C:\Users\Suzie\Desktop\FRST.exe -> Found
[Suspicious.Path] \\{14F9E1CB-1DC7-40B0-B8B0-D11746BFB08C} -- C:\Users\Suzie\Desktop\FRST.exe -> Found
[Suspicious.Path] \\{1CDB3F2C-F7E9-441A-B042-97C933F2936E} -- C:\Users\Suzie\Desktop\FRST.exe -> Found
[Suspicious.Path] \\{442743F5-A015-430A-9892-FB870522CC99} -- C:\Users\Suzie\Desktop\FRST.exe -> Found
[Suspicious.Path] \\{7D2410DE-1925-4030-ACE9-0393D7EC915B} -- C:\Users\Suzie\Desktop\FRST.exe -> Found
[Suspicious.Path] \\{BBB2ABB8-F466-4A18-A7CE-79418FBBF480} -- C:\Users\Suzie\Desktop\FRST.exe -> Found
[Suspicious.Path] \\{E151CCBB-88AA-40DC-9A39-0F4B96C34712} -- C:\Users\Suzie\Desktop\FRST.exe -> Found
¤¤¤ Files : 0 ¤¤¤
¤¤¤ Hosts File : 1 ¤¤¤
[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1 localhost
¤¤¤ Antirootkit : 40 (Driver: Loaded) ¤¤¤
[SSDT:Addr(Hook.SSDT)] NtAssignProcessToJobObject[43] : Unknown @ 0x8626c634
[SSDT:Addr(Hook.SSDT)] NtCreateKey[70] : Unknown @ 0x861f03ac
[SSDT:Addr(Hook.SSDT)] NtCreateMutant[74] : Unknown @ 0x862326c4
[SSDT:Addr(Hook.SSDT)] NtCreateProcess[79] : Unknown @ 0x8626162c
[SSDT:Addr(Hook.SSDT)] NtCreateProcessEx[80] : Unknown @ 0x8626062c
[SSDT:Addr(Hook.SSDT)] NtCreateSymbolicLinkObject[86] : Unknown @ 0x8623268c
[SSDT:Addr(Hook.SSDT)] NtCreateThread[87] : Unknown @ 0x862676bc
[SSDT:Addr(Hook.SSDT)] NtCreateThreadEx[88] : Unknown @ 0x86267684
[SSDT:Addr(Hook.SSDT)] NtCreateUserProcess[93] : Unknown @ 0x86246634
[SSDT:Addr(Hook.SSDT)] NtDebugActiveProcess[96] : Unknown @ 0x8626c6dc
[SSDT:Addr(Hook.SSDT)] NtDeleteKey[103] : Unknown @ 0x862646bc
[SSDT:Addr(Hook.SSDT)] NtDeleteValueKey[106] : Unknown @ 0x862656bc
[SSDT:Addr(Hook.SSDT)] NtDuplicateObject[111] : Unknown @ 0x86232654
[SSDT:Addr(Hook.SSDT)] NtGetContextThread[135] : Unknown @ 0x8623177c
[SSDT:Addr(Hook.SSDT)] NtLoadDriver[155] : Unknown @ 0x8626764c
[SSDT:Addr(Hook.SSDT)] NtMapViewOfSection[168] : Unknown @ 0x86266684
[SSDT:Addr(Hook.SSDT)] NtOpenProcess[190] : Unknown @ 0x8622d634
[SSDT:Addr(Hook.SSDT)] NtOpenSection[194] : Unknown @ 0x862666bc
[SSDT:Addr(Hook.SSDT)] NtOpenThread[198] : Unknown @ 0x86263634
[SSDT:Addr(Hook.SSDT)] NtProtectVirtualMemory[215] : Unknown @ 0x8626c66c
[SSDT:Addr(Hook.SSDT)] NtRenameKey[290] : Unknown @ 0x86264684
[SSDT:Addr(Hook.SSDT)] NtRestoreKey[302] : Unknown @ 0x8626464c
[SSDT:Addr(Hook.SSDT)] NtResumeThread[304] : Unknown @ 0x8623170c
[SSDT:Addr(Hook.SSDT)] NtSetContextThread[316] : Unknown @ 0x86231744
[SSDT:Addr(Hook.SSDT)] NtSetSystemInformation[350] : Unknown @ 0x862317b4
[SSDT:Addr(Hook.SSDT)] NtSetValueKey[358] : Unknown @ 0x86224e2c
[SSDT:Addr(Hook.SSDT)] NtSystemDebugControl[368] : Unknown @ 0x8626c6a4
[SSDT:Addr(Hook.SSDT)] NtTerminateProcess[370] : Unknown @ 0x86268644
[SSDT:Addr(Hook.SSDT)] NtTerminateThread[371] : Unknown @ 0x8623075c
[SSDT:Addr(Hook.SSDT)] NtWriteVirtualMemory[399] : Unknown @ 0x8626664c
[ShwSSDT:Addr(Hook.Shadow)] NtUserCreateWindowEx[361] : Unknown @ 0x8741cae4
[ShwSSDT:Addr(Hook.Shadow)] NtUserSetWindowsHookAW[584] : Unknown @ 0x869a38d4
[ShwSSDT:Addr(Hook.Shadow)] NtUserSetWindowsHookEx[585] : Unknown @ 0x879970b4
[IAT:Inl] (explorer.exe) SHELL32.dll - SHFileOperationW : C:\Program Files\Unlocker\UnlockerHook.dll @ 0x10001102 (jmp 0xffffffff9a1779fa)
[IAT:Inl] (explorer.exe @ SkyDriveShell.dll) SHELL32.dll - SHFileOperationW : C:\Program Files\Unlocker\UnlockerHook.dll @ 0x10001102 (jmp 0xffffffff9a1779fa)
[IAT:Inl] (explorer.exe @ gameux.dll) SHELL32.dll - SHFileOperationW : C:\Program Files\Unlocker\UnlockerHook.dll @ 0x10001102 (jmp 0xffffffff9a1779fa)
[IAT:Inl] (explorer.exe @ wpdshserviceobj.dll) SHELL32.dll - SHFileOperationW : C:\Program Files\Unlocker\UnlockerHook.dll @ 0x10001102 (jmp 0xffffffff9a1779fa)
[IAT:Inl] (explorer.exe @ ieframe.dll) SHELL32.dll - SHFileOperationW : C:\Program Files\Unlocker\UnlockerHook.dll @ 0x10001102 (jmp 0xffffffff9a1779fa)
[IAT:Inl] (explorer.exe @ appwiz.cpl) SHELL32.dll - SHFileOperationW : C:\Program Files\Unlocker\UnlockerHook.dll @ 0x10001102 (jmp 0xffffffff9a1779fa)
[IAT:Inl] (explorer.exe @ zipfldr.dll) SHELL32.dll - SHFileOperationW : C:\Program Files\Unlocker\UnlockerHook.dll @ 0x10001102 (jmp 0xffffffff9a1779fa)
¤¤¤ Web browsers : 0 ¤¤¤
¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: ST3320418AS ATA Device +++++
--- User ---
[MBR] 2814c990aad985df5f8fbedc07148ac6
[BSP] cd792270ffb5467780e85e9d19688940 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 305243 MB
User = LL1 ... OK
User = LL2 ... OK