Thanks for the reply,
- I ran file checker twice, nothing seemed to happen .
- I didn't run chkdsk yet because I doubt that will fix the issue seeing as its not really a disk issue, also because its takes so long, I will do this later today.
- I ran malwharebytes and it found 13-14 objects, I quarantined them all..
I did a re-boot and I got the "The procedure entry point GetTickCount64 could not be located in the dynamic link library KERNEL32.dll" error before login and then "Entry Point Not Found" error about 20 more times after logged in.
Now I'm going to try suggestions from this article:
https://answers.yahoo.com/question/index?qid=20110629192719AAgsomf
Here is the log from malwarebytes:
<?xml version="1.0" encoding="UTF-16" ?>
- <mbam-log>
- <header>
<date>2014/08/05 10:12:35 -0400</date>
<logfile>mbam-log-2014-08-05 (10-12-34).xml</logfile>
<isadmin>yes</isadmin>
</header>
- <engine>
<version>2.00.2.1012</version>
<malware-database>v2014.08.05.05</malware-database>
<rootkit-database>v2014.08.04.01</rootkit-database>
<license>free</license>
<file-protection>disabled</file-protection>
<web-protection>disabled</web-protection>
<self-protection>disabled</self-protection>
</engine>
- <system>
<osversion>Windows XP Service Pack 3</osversion>
<arch>x86</arch>
<username>BConnolly</username>
<filesys>NTFS</filesys>
</system>
- <summary>
<type>threat</type>
<result>completed</result>
<objects>509349</objects>
<time>2545</time>
<processes>0</processes>
<modules>0</modules>
<keys>12</keys>
<values>2</values>
<datas>0</datas>
<folders>0</folders>
<files>4</files>
<sectors>0</sectors>
</summary>
- <options>
<memory>enabled</memory>
<startup>enabled</startup>
<filesystem>enabled</filesystem>
<archives>enabled</archives>
<rootkits>disabled</rootkits>
<deeprootkit>disabled</deeprootkit>
<heuristics>enabled</heuristics>
<pup>warn</pup>
<pum>enabled</pum>
</options>
- <items>
- <key>
<path>HKLM\SOFTWARE\CLASSES\CLSID{E38FA08E-F56A-4169-ABF5-5C71E3C153A1}</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKLM\SOFTWARE\CLASSES\TYPELIB{1E8FC16F-4C51-49C4-BC9B-4FC24BDDCEE7}</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKLM\SOFTWARE\CLASSES\INTERFACE{0F4ABE9B-14E0-4135-9D34-F6F7427591C6}</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKLM\SOFTWARE\CLASSES\CLSID{E38FA08E-F56A-4169-ABF5-5C71E3C153A1}\INPROCSERVER32</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKLM\SOFTWARE\CLASSES\NetAssistant.NetAssistantBHO.1</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKLM\SOFTWARE\CLASSES\NetAssistant.NetAssistantBHO</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS{E38FA08E-F56A-4169-ABF5-5C71E3C153A1}</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKU\S-1-5-21-1987173571-1881542298-2545932923-1010-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS{E38FA08E-F56A-4169-ABF5-5C71E3C153A1}</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKU\S-1-5-21-1987173571-1881542298-2545932923-1010-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS{E38FA08E-F56A-4169-ABF5-5C71E3C153A1}</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</key>
- <key>
<path>HKU\S-1-5-21-1987173571-1881542298-2545932923-1010-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS{39AD0726-986D-40F9-972B-E3BFA24B7745}</path>
<vendor>PUP.Optional.ArcadeParlor.A</vendor>
<action>success</action>
<hash>45b471518dee41f53e56dac57c86926e</hash>
</key>
- <key>
<path>HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\hendmekoldfacfhlojkjcnbjegkahclb</path>
<vendor>PUP.Optional.Diamondata.A</vendor>
<action>success</action>
<hash>e811ac16f3881026359a1fbb8e7454ac</hash>
</key>
- <key>
<path>HKU\S-1-5-21-1987173571-1881542298-2545932923-1010-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\DOMSTORAGE\superfish.com</path>
<vendor>PUP.Optional.SuperFish.A</vendor>
<action>success</action>
<hash>d425ebd7f784a6900ed49c3e3ac84fb1</hash>
</key>
- <value>
<path>HKU\S-1-5-21-1987173571-1881542298-2545932923-1010-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS</path>
<valuename>{E38FA08E-F56A-4169-ABF5-5C71E3C153A1}</valuename>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<valuedata />
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</value>
- <value>
<path>HKU\S-1-5-21-1987173571-1881542298-2545932923-1010-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\URLSEARCHHOOKS{E38FA08E-F56A-4169-ABF5-5C71E3C153A1}</path>
<valuename />
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<valuedata />
<hash>06f32999fe7def4785c9b8ab04fe4fb1</hash>
</value>
- <file>
<path>C:\Program Files\InstallX\NetAssistant\NetAssistant.dll</path>
<vendor>PUP.Optional.MyFreeze.A</vendor>
<action>success</action>
<hash>5e9b9e240675d462e16d77ec7989718f</hash>
</file>
- <file>
<path>C:\users\public\Public Document\image.exe</path>
<vendor>Spyware.Password</vendor>
<action>success</action>
<hash>a4558f33bbc048eeaa777464936ff40c</hash>
</file>
- <file>
<path>C:\Documents and Settings\BConnolly\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_app.mam.conduit.com_0.localstorage</path>
<vendor>PUP.Optional.Conduit.A</vendor>
<action>success</action>
<hash>aa4f3b872457b086ae9a2bbbc53d52ae</hash>
</file>
- <file>
<path>C:\Documents and Settings\BConnolly\Local Settings\Application Data\Google\Chrome\User Data\Default\Local Storage\http_app.mam.conduit.com_0.localstorage-journal</path>
<vendor>PUP.Optional.Conduit.A</vendor>
<action>success</action>
<hash>62979230493238feb2960bdb659db54b</hash>
</file>
</items>
</mbam-log>