Rasta_steve Posted January 8, 2015 ID:927673 Share Posted January 8, 2015 Hello. I just arrived home early from work to discover my son on my PC playing games- he has his own laptop and shouldn't be using mine. Though the PC seems to work fine, I'm afraid that something is wrong. I had loaded a program- PeerBlock- awhile ago to run whenever I left my PC on so I could stream PLEX videos when I was out of town. And I just noticed the PeerBlock app was going crazy blocking communications from my PC to several others in foreign countries. So now I'm very worried. Would anyone be so kind as to take a look to see if I have any reason to be concerned? Thank you very much for any help you can provide! Steve Link to post Share on other sites More sharing options...
TwinHeadedEagle Posted January 8, 2015 ID:927674 Share Posted January 8, 2015 Hello, They call me TwinHeadedEagle around here, and I'll be working with you. Before we start please read and note the following:Limit your internet access to posting here, some infections just wait to steal typed-in passwords.Please be patient. I know it is frustrating when your PC isn't working properly, but malware removal takes time.Don't run any scripts or tools on your own, unsupervised usage may cause more harm than good.Do not paste the logs in your posts, attachments make my work easier. There is a More reply options button, that gives you Upload Files option below which you can use to attach your reports. Always attach reports from all tools.Always execute my instructions in given order. If for some reason you cannot completely follow one instruction, inform me about that.Stay with me to the end, the absence of symptoms doesn't mean that your machine is fully operational.Note that we may live in totally different time zones, what may cause some delays between answers.Do not ask for help for your business PC. Companies are making revenue via computers, so it is good thing to pay someone to repair it.If I don't hear from you within 3 days from this initial or any subsequent post, then this thread will be closed. I can't foresee everything, so if anything unexpected happens, please stop and inform me! There are no silly questions. Never be afraid to ask if in doubt! Rules and policies We won't support any piracy. That being told, if any evidence of illegal OS, software, cracks/keygens or any other will be revealed, any further assistance will be suspended. If you are aware that there is this kind of stuff on your machine, remove it before proceeding!The same applies to any use of P2P software: uTorrent, BitTorrent, Vuze, Kazaa, Ares... We don't provide any help for P2P, except for their removal. All P2P software has to be uninstalled or at least fully disabled before proceeding! Failure to follow these guidelines will result with closing your topic and withdrawning any assistance. Please download Farbar Recovery Scan Tool and save it to your desktop. Note: You need to run the version compatibale with your system. If you are not sure which version applies to your system download both of them and try to run them.Only one of them will run on your system, that will be the right version. Double-click to run it. When the tool opens click Yes to disclaimer.Press Scan button.It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply. Link to post Share on other sites More sharing options...
Rasta_steve Posted January 8, 2015 Author ID:927682 Share Posted January 8, 2015 TwinHeadedEagle! That's awesome. Here are the two files. Thank you very much for your assistance! Addition.txtFRST.txt Link to post Share on other sites More sharing options...
TwinHeadedEagle Posted January 9, 2015 ID:927883 Share Posted January 9, 2015 Logs look fine to me, let's make one more scan: Scan with Malwarebytes' Anti-Malware Please re-run Malwarebytes' Anti-Malware.First of all, select update.Once updated, click the Settings tab, in the left panel choose Detection & Protection and tick Scan for rootkits.Click the Scan tab, choose Threat Scan is checked and click Scan Now.If threats are detected, click the Apply Actions button. You will now be prompted to reboot. Click Yes.Upon completion of the scan (or after the reboot), click the History tab.Click Application Logs and double-click the newest Scan Log.At the bottom click Export and choose Text file.Save the file to your desktop and include its content in your next reply. Link to post Share on other sites More sharing options...
Rasta_steve Posted January 9, 2015 Author ID:927934 Share Posted January 9, 2015 Thank you. Both scans come up clean with the MB products. Link to post Share on other sites More sharing options...
TwinHeadedEagle Posted January 9, 2015 ID:927936 Share Posted January 9, 2015 Very good. Is everything fine now? Link to post Share on other sites More sharing options...
Rasta_steve Posted January 9, 2015 Author ID:927997 Share Posted January 9, 2015 That sounds great. But I have a few questions, if you don't mind answering. On the "Addition.txt" document, is there any concern with regard to all the Application, System and Code Integrity errors? On the "FRST.txt" doc, are these lines problematic?: 1) ==================== Registry (Whitelisted) ================== HKU\S-1-5-18\...\Run: [CtxfiReg] => CTXFIREG.exe /FAIL1 2) Chrome: CHR HKU\S-1-5-21-3562024140-3034085581-2929970775-1001\...\Chrome\Extension: [lmjegmlicamnimmfhcmpkclmigmmcbeh] - No Path Thanks. Link to post Share on other sites More sharing options...
TwinHeadedEagle Posted January 9, 2015 ID:928004 Share Posted January 9, 2015 First line is related to your Sound Card drivers. Second line is Chrome extension leftover. In Google Chrome adress bar, type this: chrome://extensions/ There you can remove everything you don't know. Link to post Share on other sites More sharing options...
Rasta_steve Posted January 9, 2015 Author ID:928019 Share Posted January 9, 2015 Ok, great thanks. So no worries about all the listed Application, System and Code Integrity errors? Also one thing that I failed to mention up front was that I was getting a very strange behavior from my keyboard. Of course, I'm paranoid, so I wondered if I'd possibly been hijacked by a keyboard logger. In an attempt to fix this problem and in advance of reaching out to you for help, I did the following:Ran AdwCleaner which cleaned the following: ***** [ Files / Folders ] ***** Folder Deleted : C:\Users\Steve\AppData\Local\Google\Chrome\User Data\Default\Extensions\dajedkncpodkggklbegccjpmnglmnflmFolder Deleted : C:\Users\Steve\AppData\Local\Google\Chrome\User Data\Default\Extensions\niloccemoadcdkdjlinkgdfekeahmfljFile Deleted : C:\END ***** [ Registry ] ***** Key Deleted : HKCU\Software\ConduitKey Deleted : [x64] HKLM\SOFTWARE\DivX\Install\Setup\WizardLayout\ConduitToolbar Ran ESET which cleaned the following: sh=52F3182E4CD4058D14AFD9E40B14FED9D9B1494B ft=1 fh=aa14e09e22f2a50f vn="a variant of Win32/OpenCandy.C potentially unsafe application (deleted - quarantined)" ac=C fn="C:\Users\Steve\AppData\Local\Temp\utt3977.tmp"sh=205EA3A873C765FF2E0F78FB1834D6EB44C21BF3 ft=1 fh=a409751ddc77dac3 vn="Win32/Bundled.Toolbar.Google.D potentially unsafe application (deleted - quarantined)" ac=C fn="D:\Downloads\ccsetup501.exe"sh=2A93C4E8DE1F8A733B86A8F5D543F32C903F5707 ft=1 fh=70f2756a9c6ef613 vn="Win32/Somoto.E potentially unwanted application (deleted - quarantined)" ac=C fn="D:\Downloads\DVDStyler-2.7-win32.exe" Then ran RogueKiller which cleaned the following: ¤¤¤ Processes : 2 ¤¤¤[suspicious.Path] explorer.exe(4568) -- C:\Users\Steve\AppData\Roaming\Copy\overlay\CopyShExt.dll[-] -> Unloaded[suspicious.Path] explorer.exe(4568) -- C:\Users\Steve\AppData\Roaming\Copy\overlay\Brt.dll[7] -> Unloaded ¤¤¤ Registry : 13 ¤¤¤[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\1aCopyShExtError | (default) : {83BEA36E-7680-4598-A4DF-994426F6E78D} -> Deleted[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\2aCopyShExtSynced | (default) : {845B7388-6F85-4F32-9FD5-F02DC7882B89} -> Deleted[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\3aCopyShExtSyncing | (default) : {F6378A7A-F753-449B-AE1B-997A96132E61} -> Deleted[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\4aCopyShExtSyncingProg1 | (default) : {3A511828-777D-46F8-82F4-5B530C1B3D9E} -> Deleted[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\5aCopyShExtSyncingProg2 | (default) : {C8C88204-5B14-40EC-BA72-8AEBC762047E} -> Deleted[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\6aCopyShExtSyncingProg3 | (default) : {ACFF45C3-3EEB-4351-86C2-6696BA264239} -> Deleted[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\7aCopyShExtSyncingProg4 | (default) : {29AF997F-488B-46F0-AE78-7146F1B89CC3} -> Deleted[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellIconOverlayIdentifiers\8aCopyShExtSyncingProg5 | (default) : {03F9AD29-1C78-4B66-8890-B177B5430C53} -> Deleted[Hidden.From.SCM] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\UnlockerDriver5 (\??\C:\Program Files\Unlocker\UnlockerDriver5.sys) -> Not selected[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Replaced (0)[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Replaced (0)[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 -> Replaced (0)[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 -> Replaced (0) Maybe that pretty much cured everything before I contacted you. Do you recognize anything above as being very bad, like a keylogger or anything? I'm now very nervous about all my passwords. Thanks so much for your opinions! Link to post Share on other sites More sharing options...
TwinHeadedEagle Posted January 10, 2015 ID:928144 Share Posted January 10, 2015 No, these lines belong to Adware, there are no signs of keylogger here. Link to post Share on other sites More sharing options...
Rasta_steve Posted January 12, 2015 Author ID:928677 Share Posted January 12, 2015 OK. Well I thank you very, very much for looking this over and for answering all my questions. I really do appreciate your service and the peace of mind that you've given me. Have a great day THE! Steve Link to post Share on other sites More sharing options...
TwinHeadedEagle Posted January 12, 2015 ID:928718 Share Posted January 12, 2015 Glad I could help. We will delete all used tools and I'll give you some tips to harden your security and learn how to protect yourself Recommended reading: MUST READ - security tips:Computer Security - a short guide to staying safer online.Simple and easy ways to keep your computer safe and secure on the InternetMUST READ - general maintenance:What to do if your Computer is running slowly?The Importance of Software Updating: In order to stay protected it is very important that you regularly update all of your software. Cybercriminals depend on the apathy of users around software updates to keep their malicious endeavor running. Operating systems, such as Windows, and applications, such as Adobe Reader or JAVA, are used by tens of millions of computers and devices around the world, making them a huge target for cybercriminals. Downloading updates and installing them can sometimes be tedious, but the advantages you get from the updates are certainly worth it.How to configure and use Automatic Updates in WindowsHow to update JavaHow to update Adobe ReaderRecommended additional software: TFC - to clean unneeded temporary files.Malwarebytes' Anti-Malware - to scan your system from time to time in search for malware.Malwarebytes' Anti-Exploit - to prevent plenty of mostly exploited vulnerabilities.McShield - to prevent infections spread by removable media.Unchecky - to prevent from installing additional foistware, implemented in legitimate installations.Adblock - to surf the web without annoying ads! Post-cleanup procedures: Download DelFix by Xplode and save it to your desktop.Run the tool by right click on the icon and Run as administrator option.Make sure that these ones are checked:Remove disinfection toolsPurge system restoreReset system settingsPush Run.The program will run for a few seconds and display a notepad report. You do not need to attach it.The tool will also record healthy state of registry and make a backup using ERUNT program in %windir%\ERUNT\DelFixTool deletes old system restore points and create a fresh system restore point after cleaning. My help is free for everybody.If you're happy with the help provided and/or wish to buy me a beer for the assistance you received, then you can consider a donation: Thank you! Stay safe,TwinHeadedEagle Link to post Share on other sites More sharing options...
Root Admin AdvancedSetup Posted January 12, 2015 Root Admin ID:928828 Share Posted January 12, 2015 Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread. Thanks! Link to post Share on other sites More sharing options...
Recommended Posts