Jump to content

LiquidTension

Honorary Members
  • Posts

    4,182
  • Joined

  • Last visited

Everything posted by LiquidTension

  1. Hello krissypooh52, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.Please backup important documents before proceeding with my instructions.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page. ====================================================== Let me know if you have issues downloading the programmes below. STEP 1 Farbar Recovery Scan Tool (FRST) Scan Please download Farbar Recovery Scan Tool (x32) or Farbar Recovery Scan Tool (x64) and save the file to your Desktop.Note: Download and run the version compatible with your system (32 or 64-bit). Download both if you're unsure; only one will run.Right-Click FRST.exe / FRST64.exe and select Run as administrator to run the programme.Click Yes to the disclaimer.Ensure the Addition.txt box is checked.Click the Scan button and let the programme run.Upon completion, click OK, then OK on the Addition.txt pop up screen.Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply. STEP 2 TDSSKiller Scan Please download TDSSKiller and save the file to your Desktop.Right-Click TDSSKiller.exe and select Run as administrator to run the programme.Click Change parameters. Place a checkmark next to Detect TDLFS file system and Verify file digital signatures.​Click Start Scan. Do not use the computer during the scan.If objects are found, change the action to skip.Click Continue and close the window.A log will be created and saved to the root directory (usually C:\). Attach the file in your next reply. ====================================================== STEP 3 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. FRST.txtAddition.txtTDSSKiller log (attached)
  2. OK. Good luck with the reformat! All the best, Adam.
  3. You're more than welcome. Is there anything else I can help you with, or should this topic be closed?
  4. OK, sounds good. Post up the two logs (FRST.txt and Addition.txt) when complete, and proceed with STEP 2 (TDSSKiller).
  5. Hello Ryan, I am not an advocate of AVG. The programme is a resource hog.In 2010, AVG partnered with Limewire - a P2P filesharing programme. P2P filesharing is one of largest infection vectors.AVG bundles registry/optimization software. Programmes that purport to clean your registry are snake oil. AVG bundles AVG Secure Search; software considered as a browser hijacker. I have seen many complaints concerning the quality of customer support. I recommend one of the following anti-virus software. avast! Free Anti-Virus (free)Avira Free Anti-Virus (free)Microsoft Security Essentials (free)ESET NOD32 Anti-Virus (paid)Kaspersky Anti-Virus (paid)Emsisoft Internet Security (paid)For a paid solution, my choice of anti-virus is ESET NOD32, and for a free solution, my choice of anti-virus is avast!. However, there is no universal "one size fits all" solution that works for everyone and there is no single best anti-virus. What works for me may not work for you and your machine. I have compiled below a list of resources you may find useful. The articles document information on computer security, common infection vectors and how you can stay safe on the Internet. Answers to common security questions - Best Practices by quietman7, MVPHow Malware Spreads - How did I get infected? by quietman7, MVPSimple and easy ways to keep your computer safe and secure on the Internet by Lawrence Abrams, MVPHow to Prevent Malware by miekiemoes, MVPHow to backup and restore your data using Cobian Backup by YourHighnessSlow Computer/browser? It May Not Be Malware by quietman7, MVP The following programmes come highly recommended in the security community. AdBlock is a browser add-on that blocks annoying banners, pop-ups and video ads. Emsisoft Antimalware (free) acts as an additional on-demand scanner, and can be used in conjunction with your Anti-Virus. Malwarebytes Anti-Exploit (MBAE) is designed to prevent zero-day malware from exploiting vulnerable software. Malwarebytes Anti-Malware Premium (MBAM) incorporates real-time protection and is designed to run alongside your Anti-Virus. NoScript is a Firefox add-on that blocks the actions of malicious scripts by using whitelisting and other technology. Sandboxie isolates programmes of your choice, preventing files from writing to your HDD unless you approve the file. Secuina PSI will scan your computer for vulnerable software that is outdated, and automatically find the latest update for you. SpywareBlaster is a form of passive protection, designed to block the actions of malicious websites and tracking cookies. Unchecky automatically removes checkmarks for additional software in programme installers, helping you avoid adware and PUPs. Web of Trust (WOT) is a browser add-on designed to alert the user before interacting with a potentially malicious website. To help combat this particular infection (Poweliks), I recommend looking into using WinPatrol.
  6. Hello lolppo, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.Please backup important documents before proceeding with my instructions.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page.====================================================== Unfortunately, your computer is infected with a rootkit. As such, I must issue the following warning. Please let me know how you wish to proceed.
  7. Close FRST. Try running RKill, followed by FRST. If you still can't get FRST to Scan then running in Safe Mode would be the best option. RKill Please download RKill and save the file to your Desktop.Right-Click RKill.exe and select Run as administrator to run the programme.A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.Important: Please do NOT reboot your computer until you have carried out the steps below.A log (C:\rkill.log) will open once the scan has completed. Copy the contents of the log and paste in your next reply.Note: If the programme fails to run, or encounters an error, please delete RKill.exe and download the following file. Repeat the steps using the newly downloaded iExplore.exe.
  8. Please boot into Safe Mode, and run FRST there. Instructions below. Boot into Safe Mode (Vista/7) Restart your PC.As soon as the BIOS is loaded, begin repeatedly tapping the F8 key until the Advanced Options menu appears. Using the arrow keys, select Safe Mode. Press the Enter key. Boot into Safe Mode (Windows 8) Press the Windows Key + r on your keyboard at the same time. Type msconfig and click OK.Click the Boot tab.Place a checkmark next to Safe boot. Leave the checkmark next to Minimal.Click OK, followed by Restart.Your PC will boot into Safe Mode automatically.
  9. Yes, go ahead and reconnect the infected machine. As we will be dealing with the infection(s) now, you should be OK to do so. Please delete your current copy of ComboFix. Ensure you download a fresh copy using the link provided.
  10. Hello mailalan, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page. ====================================================== Rather than work in Safe Mode, we can enter the Recovery Environment where the malware cannot load. Note: You require access to a clean PC and USB drive. STEP 1 Panda USB Vaccine Using a clean PC, please download Panda USB Vaccine and save the file to your Desktop.Double-click USBVaccineSetup.exe to install the programme.Read and accept the license agreement, then click Next.Upon completion of the setup, ensure Launch Panda USB Vaccine is checked and click Finish.Click the Vaccinate Computer button. It should now show a green checkmark and confirm Computer vaccinated. Hold down the Shift key on your keyboard and insert your USB flash/external drive.When the name of the drive appears in the Panda USB Vaccine dialog box, click the Vaccinate USB drive(s) button.Exit the programme when done.-- Computer Vaccination will prevent any AutoRun file from running, regardless of whether the removable device is infected or not. USB Vaccination disables the autorun file so it cannot be read, modified or replaced and creates an AUTORUN_.INF as protection against malicious code. The Panda Resarch Blog advises that once USB drives have been vaccinated, they cannot be reversed except with a format. If you do this, be sure to back up your data files first or they will be lost during the formatting process. STEP 2 FRST Recovery Environment Scan Note: Please print off these instructions, or ensure you have access to them using a different device. Insert your USB drive into your clean PC.Please download Farbar Recovery Scan Tool (x64) to your USB drive using your clean PC.Insert the USB drive into the infected PC. Enter the Recovery Environment by choosing one of the options below. Option #1: Enter Recovery Environment (Windows 7/Vista) Restart the infected computer.As soon as the BIOS is loaded begin tapping the F8 key until the Advanced Boot Options appears.Use the arrow keys to select the Repair your computer menu item.Select your the keyboard language settings, and then click Next.Select the operating system you wish to repair, and then click Next.Select your user account, and then click Next. Option #2: Enter Recovery Environment (Windows Installation Disc) Insert your Windows installation disc.Restart your computer.Configure your infected PC to boot from CD/DVD. Instructions on how to do this can be found here.If prompted, press any key to start Windows from the installation disc.Click Repair your computer.Select English as the keyboard language settings, and then click Next.Select the Operating System you want to repair, and then click Next.Select your user account, and then click Next. Advanced Boot Options Menu Select Command Prompt.In the command window type notepad and press Enter on your keyboard.Notepad will open. Click File followed by Open. Click Computer, write down your USB drive letter on a piece of paper and close Notepad.Type: x:\frst64.exe in the command window. Note: Replace letter x with the drive letter of your USB drive you wrote down earlier.Press Enter on your keyboard. The tool will start to run.When the tool opens click Yes to the disclaimer.Click Scan.A log (FRST.txt) will be saved to your USB drive. Proceed with STEP 3 before exiting FRST and the Recovery Environment. STEP 3 Farbar Recovery Scan Tool (FRST) Search Return to FRST. Type the following text into the Search: textbox: User32.dllClick on the Search File(s) button.Upon completion, a log (Search.txt) will be saved to your USB drive.Remove your USB drive and insert into your clean PC. Using your clean PC, open Windows Explorer and navigate to your USB drive. Copy the contents of both FRST.txt and Search.txt and paste in your next reply. ====================================================== STEP 4 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. FRST.txtSearch.txt
  11. Hello DedSecGhost, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.Please backup important documents before proceeding with my instructions.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page. ====================================================== STEP 1 Farbar Recovery Scan Tool (FRST) Scan Please download Farbar Recovery Scan Tool (x32) or Farbar Recovery Scan Tool (x64) and save the file to your Desktop.Note: Download and run the version compatible with your system (32 or 64-bit). Download both if you're unsure; only one will run.Right-Click FRST.exe / FRST64.exe and select Run as administrator to run the programme.Click Yes to the disclaimer.Ensure the Addition.txt box is checked.Click the Scan button and let the programme run.Upon completion, click OK, then OK on the Addition.txt pop up screen.Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply. STEP 2 TDSSKiller Scan Please download TDSSKiller and save the file to your Desktop.Right-Click TDSSKiller.exe and select Run as administrator to run the programme.Click Change parameters. Place a checkmark next to Detect TDLFS file system and Verify file digital signatures.​Click Start Scan. Do not use the computer during the scan.If objects are found, change the action to skip.Click Continue and close the window.A log will be created and saved to the root directory (usually C:\). Attach the file in your next reply. ====================================================== STEP 3 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. FRST.txtAddition.txtTDSSKiller log (attached)
  12. The infection that is causing the issues described in your opening post can be removed. T he reason for recommending an R/R is because backdoors allow a remote attacker to make any number of modifications to your system; some of which may not be possible to detect or identify. You're infected with Poweliks. A rootkit which opens a backdoor on the compromised machine. Poweliks is unique and sophisticated, in that it does not use any malicious files written to the HDD once the dropper is on the system. Instead, the infection is contained entirely within the registry, and utilizes legitimate System Files such as dllhost.exe and programmes such as Powershell. Anti-Virus software does not tend to monitor the registry, and as such, is ineffective in detecting this infection. Furthermore, once the dropper has finished, the file is deleted. This makes it difficult for Anti-Virus vendors to obtain, analyse and write signatures for Poweliks droppers.
  13. Hello Anthony, You have a choice. We can either clean your machine now or you reformat/reinstall. If we clean - the identified infection(s) can be removed, but I cannot guarantee all malware will be. This is due to the nature of the infection. This option may be considered the more convenient of the two. On the otherhand, you can reformat/reinstall. This will wipe all data from the computer, and is the recommended course of action. Going down this route will guarantee all malware removed, and ensure the integrity and trustworthiness of your machine restored. ----------- Ultimately, the decision is personal, and down to you. I am simply here to inform you of the facts. I believe fully explaining the situation to be imperative.
  14. Hello assimilation, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.Please backup important documents before proceeding with my instructions.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page.====================================================== Unfortunately, your computer is infected with a rootkit. As such, I must issue the following warning. Please let me know how you wish to proceed.
  15. Good job. Please run the following diagnostic tool so I can ascertain the state of your machine. Farbar Recovery Scan Tool (FRST) Scan Please download Farbar Recovery Scan Tool (x64) and save the file to your Desktop.Right-Click FRST64.exe and select Run as administrator to run the programme.Click Yes to the disclaimer.Ensure the Addition.txt box is checked.Click the Scan button and let the programme run.Upon completion, click OK, then OK on the Addition.txt pop up screen.Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply.
  16. Hello Jim, Navigate to C:\Users\Jim\Downloads. Delete any files you do not recognise, or do not need. STEP 1 Update Outdated Software Outdated software contain security risks that must be patched. Please download and install the latest version of the programmes below. Adobe Reader (Uncheck the "Optional Offer") Google Chrome Java (Uncheck any "Optional Offer") Mozilla Firefox Follow these instructions to check for and download the latest Windows Updates. STEP 2 Remove Outdated Software Press the Windows Key + r on your keyboard at the same time. Type appwiz.cpl and click OK.Search for the following programmes, right-click and click Uninstall one at a time.Note: The programmes below may not be present. If this is the case, please skip to the next step.Adobe Reader X (10.1.12)Java 7 Update 67Follow the prompts, and reboot if necessary. STEP 3 Disable Java in Your Browser Due to frequent exploits we recommend you disable Java in your browser. For information on Java vulnerabilities, please read the following article (point #7). Click the Windows Start Button and type Java Control Panel (or javacpl) in the search bar. Click on the Java Control Panel. Once opened, click the Security tab.Deselect the check box for Enable Java content in the browser. This will disable the Java plug-in in the browser. Click Apply. When the Windows User Account Control (UAC) appears, allow permissions to make the changes. Click OK in the Java Plug-in confirmation window.Restart your browser(s) for changes to take effect.More information can be found here and here. STEP 4 Security Check Please download SecurityCheck and save the file to your Desktop.Double-click SecurityCheck.exe and follow the onscreen instructions inside the black box.A log (checkup.txt) will automatically open on your Desktop.Copy the contents of the log and paste in your next reply. ====================================================== STEP 5 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. checkup.txtHow is your computer performing? Are there any outstanding issues?
  17. Hello, I am not a Malwarebytes employee. I assist users with malware-related issues on a volunteer basis. You mean there's a message stating your copy of Windows is not genuine? When did this appear? STEP 1 ComboFix Note: Please read through these instructions before running ComboFix. Please download ComboFix and save the file to your Desktop. << Important!Temporarily disable your anti-virus software. For instructions, please refer to the following link.Right-Click ComboFix.exe and select Run as administrator to run the programme.Follow the prompts. Allow ComboFix to complete it's removal routine (please refer to Important Notes:).Upon completion, a log (ComboFix.txt) will be created in the root directory (C:\). Copy the contents of the log and paste in your next reply.Re-enable your anti-virus software. Important Notes: Do NOT mouse click ComboFix's window whilst it is running. This may cause the programme to stall.Do NOT use your computer whilst ComboFix is running.Your Desktop/taskbar may disappear whilst ComboFix is running; this is normal. If you get the message Illegal operation attempted on registry key that has been marked for deletion please reboot your computer.ComboFix will disconnect your machine from the Internet as soon as it starts.Please do not attempt to re-connect your machine back to the Internet until ComboFix has completely finished.If you are unable to access the Internet after running ComboFix, please reboot your computer. STEP 2 TDSSKiller Scan Please download TDSSKiller and save the file to your Desktop.Right-Click TDSSKiller.exe and select Run as administrator to run the programme.Click Change parameters. Place a checkmark next to:Loaded ModulesDetect TDLFS file systemVerify file digital signaturesNote: If you receive the following message: Extended Monitoring Driver is required, click Reboot now, and continue from here following the reboot.​Click Start Scan. Do not use the computer during the scan.If objects are found, change the action to skip.Click Continue and close the window.A log will be created and saved to the root directory (usually C:\). Attach the log in your next reply. STEP 3 MGADiag Please download MGADiag and save the file to your Desktop.Double-click the MGADiag icon on your Desktop.Click .Click .Press the Windows Key + r on your keyboard at the same time. Type Notepad and click OK.Click Edit followed by Paste in Notepad.Copy the contents of the log and paste in your next reply. ====================================================== STEP 4 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. ComboFix.txtTDSSKiller log (attached)MGADiag log
  18. Did you run an MBAM scan? Did it detect anything? I do not see the TDSSKiller log attached.
  19. Hi Schuyler, You are more than welcome. Thank you for attaching the logs. Based on these logs we are OK to proceed, but only after you've considered the warning below. Your machine is heavily infected, and as such, it's imperative you are made aware of the following.
  20. Hello SexyCatt, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.Please backup important documents before proceeding with my instructions.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page. ====================================================== Which software is detecting Caphaw? Please run the following programmes. STEP 1 Malwarebytes Anti-Malware (MBAM) If you have not downloaded and installed the updated Malwarebytes Anti-Malware 2.0 please do so now. Open Malwarebytes Anti-Malware and click Update Now.Once updated, click the Settings tab and tick Scan for rootkits.Click the Scan tab, ensure Threat Scan is checked and click Scan Now.Note: You may see the following message, "Could not load DDA driver". Click Yes, allow your PC to reboot and continue afterwards. If threats are detected, click the Apply Actions button. You will now be prompted to reboot. Click Yes.Upon completion of the scan (or after the reboot), click the History tab.Click Application Logs and double-click the Scan Log.Click Copy to Clipboard and paste the log in your next reply. STEP 2 TDSSKiller Scan Please download TDSSKiller and save the file to your Desktop.Right-Click TDSSKiller.exe and select Run as administrator to run the programme.Click Change parameters. Place a checkmark next to Detect TDLFS file system and Verify file digital signatures.​Click Start Scan. Do not use the computer during the scan.If objects are found, change the action to skip.Click Continue and close the window.A log will be created and saved to the root directory (usually C:\). Copy the contents of the log and paste in your next reply. ====================================================== STEP 3 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. Which software is detecting Caphaw?MBAM logTDSSKiller log
  21. Hi Sean, Once you've changed your router's password you should be OK. Changing the router's password is to cover all bases so to speak. Router malware is uncommon, and there's nothing if in your logs that would suggest this is the case. If you're experiencing no issues with other devices connected to the same network, there shouldn't be any need to worry. Do you require assistance with backing up your data, reformatting/restoring your machine or transfering backed up data back?
  22. OK. Thank you for letting me know. Do you require additional assistance having decided to reformat/restore, or should this topic be closed?
  23. Hello radio, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.Please backup important documents before proceeding with my instructions.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page. ======================================================STEP 1 Malwarebytes Anti-Malware (MBAM) If you have not downloaded and installed the updated Malwarebytes Anti-Malware 2.0 please do so now.Open Malwarebytes Anti-Malware and click Update Now.Once updated, click the Settings tab and tick Scan for rootkits.Click the Scan tab, ensure Threat Scan is checked and click Scan Now.Note: You may see the following message, "Could not load DDA driver". Click Yes, allow your PC to reboot and continue afterwards.If threats are detected, click the Apply Actions button. You will now be prompted to reboot. Click Yes.Upon completion of the scan (or after the reboot), click the History tab.Click Application Logs and double-click the Scan Log.Click Copy to Clipboard and paste the log in your next reply.STEP 2 TDSSKiller Scan Please download TDSSKiller and save the file to your Desktop.Right-Click TDSSKiller.exe and select Run as administrator to run the programme.Click Change parameters. Place a checkmark next to Detect TDLFS file system and Verify file digital signatures.​Click Start Scan. Do not use the computer during the scan.If objects are found, change the action to skip.Click Continue and close the window.A log will be created and saved to the root directory (usually C:\). Attach the file in your next reply.======================================================STEP 3 Logs In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked. MBAM logTDSSKiller log (attached)
  24. Hello Xerd, welcome to Malwarebytes' Malware Removal forum! My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems. If you would allow me to call you by your first name I would prefer that. General P2P/Piracy Notice: ====================================================== Please read through the points below to ensure this process moves as quickly and efficiently as possible. Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.Please do not post logs using the CODE, QUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation & providing the best set of instructions for you.Please backup important documents before proceeding with my instructions.If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before you run anything.Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.Ensure you are following this topic. Click at the top of the page.======================================================Unfortunately, your computer is infected with a rootkit that opens a backdoor on the compromised machind. As such, I must issue the following warning. Please let me know how you wish to proceed.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.