Jump to content

Recommended Posts

So i know this is related to windows defender, but I have seen other threads with my problem. Windows defender is quarantining itemsimage.thumb.png.dbb3aefe6f99ae8dfb7ac17ae5ad77b7.png  

Some of them are trying to delete my Sony Vaio care, yet some say 

file:C:\Windows\System32\iolorgdf64.exe
firefoxplugins:HKLM\SOFTWARE\MozillaPlugins\@java.com/DTPlugin,version=10.13.2
regkey:HKLM\SOFTWARE\MozillaPlugins\@java.com/DTPlugin,version=10.13.2 

or

clsid:HKLM\SOFTWARE\CLASSES\Wow6432Node\CLSID\{2A090754-16A6-407D-883D-A5C0F8CF9992}
clsid:HKLM\SOFTWARE\CLASSES\Wow6432Node\CLSID\{C9480C5A-8921-4C96-BAB1-3D56AE999B70}
file:C:\Program Files\Sony\VAIO Care\Iolo\ioloTools.exe
file:C:\PROGRA~1\Sony\VAIOCA~1\Iolo\IOLOTO~1.EXE
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{0033698F-1332-4963-99F3-7BC36ABFE13E}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{0F8A26B3-2B10-4AAB-A97F-393333B9D5C9}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{28637EB6-7F05-40C6-BD96-1850B9E8603F}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{2B721EEB-BDA2-4F5A-AF5E-56213EB47BFD}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{3D74091E-BA60-40EC-A09D-81DF16A7EC12}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{40D797FB-1418-4689-8C47-634A8E21E77F}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{57EED195-35A3-4425-A3DA-9638746A0F78}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{816D649C-F0ED-41FF-956C-6568609F4570}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{935B5B76-ABBD-407D-B5E1-AACADF5045E6}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{9D8E5931-AF9E-4A20-8B90-2C82860B13F8}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{B54B80F3-9227-4D46-BF22-ABBF75174412}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{B5FC8155-91F9-4B76-BAE1-462C95CE85B2}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{C382A7AC-33DB-46D3-A34D-7A22FBB92BFC}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{C5FD77DF-C570-483A-9CE9-146ACF651A83}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{CDFEC96E-EF0B-4F37-96CC-32E2CB2102E3}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{EDF15D72-F2E1-4B0A-93AC-FFB3CFCD71CD}
interface:HKLM\SOFTWARE\CLASSES\INTERFACE\{F7D7E8DE-A7AA-4329-A166-18CABA3F065C}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{0033698F-1332-4963-99F3-7BC36ABFE13E}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{0F8A26B3-2B10-4AAB-A97F-393333B9D5C9}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{28637EB6-7F05-40C6-BD96-1850B9E8603F}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{2B721EEB-BDA2-4F5A-AF5E-56213EB47BFD}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{3D74091E-BA60-40EC-A09D-81DF16A7EC12}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{40D797FB-1418-4689-8C47-634A8E21E77F}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{57EED195-35A3-4425-A3DA-9638746A0F78}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{816D649C-F0ED-41FF-956C-6568609F4570}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{935B5B76-ABBD-407D-B5E1-AACADF5045E6}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{9D8E5931-AF9E-4A20-8B90-2C82860B13F8}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{B54B80F3-9227-4D46-BF22-ABBF75174412}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{B5FC8155-91F9-4B76-BAE1-462C95CE85B2}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{C382A7AC-33DB-46D3-A34D-7A22FBB92BFC}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{C5FD77DF-C570-483A-9CE9-146ACF651A83}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{CDFEC96E-EF0B-4F37-96CC-32E2CB2102E3}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{EDF15D72-F2E1-4B0A-93AC-FFB3CFCD71CD}
interface:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{F7D7E8DE-A7AA-4329-A166-18CABA3F065C}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{0033698F-1332-4963-99F3-7BC36ABFE13E}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{0F8A26B3-2B10-4AAB-A97F-393333B9D5C9}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{28637EB6-7F05-40C6-BD96-1850B9E8603F}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{2B721EEB-BDA2-4F5A-AF5E-56213EB47BFD}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{3D74091E-BA60-40EC-A09D-81DF16A7EC12}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{40D797FB-1418-4689-8C47-634A8E21E77F}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{57EED195-35A3-4425-A3DA-9638746A0F78}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{816D649C-F0ED-41FF-956C-6568609F4570}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{935B5B76-ABBD-407D-B5E1-AACADF5045E6}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{9D8E5931-AF9E-4A20-8B90-2C82860B13F8}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{B54B80F3-9227-4D46-BF22-ABBF75174412}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{B5FC8155-91F9-4B76-BAE1-462C95CE85B2}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{C382A7AC-33DB-46D3-A34D-7A22FBB92BFC}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{C5FD77DF-C570-483A-9CE9-146ACF651A83}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{CDFEC96E-EF0B-4F37-96CC-32E2CB2102E3}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{EDF15D72-F2E1-4B0A-93AC-FFB3CFCD71CD}
regkey:HKLM\SOFTWARE\CLASSES\INTERFACE\{F7D7E8DE-A7AA-4329-A166-18CABA3F065C}
regkey:HKLM\SOFTWARE\CLASSES\TYPELIB\{1BE26DDD-B9B9-464D-9EDA-7415E53F2B58}\1.1
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\CLSID\{2A090754-16A6-407D-883D-A5C0F8CF9992}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\CLSID\{C9480C5A-8921-4C96-BAB1-3D56AE999B70}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{0033698F-1332-4963-99F3-7BC36ABFE13E}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{0F8A26B3-2B10-4AAB-A97F-393333B9D5C9}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{28637EB6-7F05-40C6-BD96-1850B9E8603F}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{2B721EEB-BDA2-4F5A-AF5E-56213EB47BFD}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{3D74091E-BA60-40EC-A09D-81DF16A7EC12}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{40D797FB-1418-4689-8C47-634A8E21E77F}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{57EED195-35A3-4425-A3DA-9638746A0F78}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{816D649C-F0ED-41FF-956C-6568609F4570}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{935B5B76-ABBD-407D-B5E1-AACADF5045E6}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{9D8E5931-AF9E-4A20-8B90-2C82860B13F8}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{B54B80F3-9227-4D46-BF22-ABBF75174412}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{B5FC8155-91F9-4B76-BAE1-462C95CE85B2}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{C382A7AC-33DB-46D3-A34D-7A22FBB92BFC}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{C5FD77DF-C570-483A-9CE9-146ACF651A83}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{CDFEC96E-EF0B-4F37-96CC-32E2CB2102E3}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{EDF15D72-F2E1-4B0A-93AC-FFB3CFCD71CD}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\INTERFACE\{F7D7E8DE-A7AA-4329-A166-18CABA3F065C}
regkey:HKLM\SOFTWARE\CLASSES\Wow6432Node\TYPELIB\{1BE26DDD-B9B9-464D-9EDA-7415E53F2B58}\1.1
typelib:HKLM\SOFTWARE\CLASSES\TYPELIB\{1BE26DDD-B9B9-464D-9EDA-7415E53F2B58}
typelib:HKLM\SOFTWARE\CLASSES\Wow6432Node\TYPELIB\{1BE26DDD-B9B9-464D-9EDA-7415E53F2B58}
typelibversion:HKLM\SOFTWARE\CLASSES\TYPELIB\{1BE26DDD-B9B9-464D-9EDA-7415E53F2B58}\1.1
typelibversion:HKLM\SOFTWARE\CLASSES\Wow6432Node\TYPELIB\{1BE26DDD-B9B9-464D-9EDA-7415E53F2B58}\1.1

I saw a thread:

Where HKLM was contained. Windows defender quarantined the files before malware bytes may have had the chance to detect it. Is this trojan(where as i will just delete the infected files or find ways to keep it from coming back) or should i stop windows defender from deleting them and quarantine them.

Please get back to me as soon as possible, thanks

Link to post
Share on other sites

  • Root Admin

Hello @fireagentk and :welcome:

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Link to post
Share on other sites

First file

Malwarebytes Scan.txt

AdwCleaner:

# AdwCleaner 7.0.7.0 - Logfile created on Thu Feb 08 14:03:48 2018
# Updated on 2018/18/01 by Malwarebytes 
# Running on Windows 8.1 Pro (X64)
# Mode: clean
# Support: https://www.malwarebytes.com/support

***** [ Services ] *****

No malicious services deleted.

***** [ Folders ] *****

No malicious folders deleted.

***** [ Files ] *****

No malicious files deleted.

***** [ DLL ] *****

No malicious DLLs cleaned.

***** [ WMI ] *****

No malicious WMI cleaned.

***** [ Shortcuts ] *****

No malicious shortcuts cleaned.

***** [ Tasks ] *****

No malicious tasks deleted.

***** [ Registry ] *****

Deleted: [Key] - HKLM\SOFTWARE\Classes\Interface\{7D86A08B-0A8F-4BE0-B693-F05E6947E780}


***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries deleted.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries deleted.

*************************

::Tracing keys deleted
::Winsock settings cleared
::Additional Actions: 0

*************************

C:/AdwCleaner/AdwCleaner[S0].txt - [1010 B] - [2018/2/8 14:3:8]


########## EOF - C:\AdwCleaner\AdwCleaner[C0].txt ##########

Edited by fireagentk
Link to post
Share on other sites

  • Root Admin

You have an old compromised version of Java. Please uninstall all versions of Java and if possible try to use the computer without Java. If you have to have it then make sure it's up to date at all times. https://java.com

 

Please read the following article concerning the use of MSCONFIG
Msconfig Is Not A Startup Manager

 

Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

 

fixlist.txt

 

Thanks

Ron

 

Link to post
Share on other sites

  • Root Admin

Great, glad the issue has been resolved.

 

At this time there are no more signs of an infection on your system.
However if you are still seeing any signs of an infection please let me know.

Let's go ahead and remove the tools and logs we've used during this process.

Most of the tools used are potentially dangerous to use unsupervised or if ran at the wrong time.
They are often updated daily so if you went to use them again in the future they would be outdated anyways.

The following procedures will implement some cleanup procedures to remove these tools.
 
bwebb7v.jpgDownload Delfix from here and save it to your desktop. (you may already have this)

  • Ensure Remove disinfection tools is checked.
  • Click the Run button.
  • Reboot


Any other programs or logs that are still remaining, you can manually delete. (right click.....Delete)
IE: RogueKiller.exe, RKreport.txt, RK_Quarantine folder, C:\FRST folder, FRST-OlderVersion folder, MBAR folder, etc....AdwCleaner > just run the program and click uninstall.


 
If there are any other left over Folders, Files, Logs then you can delete them on your own.
 
Please visit the following link to see how to delete old System Restore Points. Please delete all of them and create a new one at this time.
How to Delete System Protection Restore Points in Windows 7 and Windows 8


As Java seems to get exploited on a regular basis I advise not using Java if possible but to at least disable java in your web browsers
How do I disable Java in my web browser? - Disable Java

A lot of reading here but if you take the time to read a bit of it you'll see why/how infections and general damage are so easily inflicted on the computer. There is also advice on how to prevent it and keep the system working well. Don't forget about good, solid backups of your data to an external drive that is not connected except when backing up your data. If you leave a backup drive connected and you do get infected it can easily damage, encrypt, delete, or corrupt your backups as well and then you'd lose all data.
Nothing is 100% bulletproof but with a little bit of education you can certainly swing things in your favor.


If you're not currently using Malwarebytes Premium then you may want to consider purchasing the product which can also help greatly reduce the risk of a future infection.

 

Link to post
Share on other sites

  • Root Admin

On Windows 8.1 you can use the following link from Microsoft on how to perform this operation.

https://support.microsoft.com/en-us/help/17127/windows-back-up-restore

Create a restore point

You can use a restore point to restore your computer's system files to an earlier point in time. Restore points are automatically created each week by System Restore and when your PC detects change, like when you install an app or driver.

Here's how to create a restore point.

 

  1. Right-click the Start  button, then select Control Panel > System and Maintenance > System.
  2. In the left pane, select System protection.
  3. Select the System Protection tab, and then select Create.
  4. In the System Protection dialog box, type a description, and then select Create.

 

For information only. Do not do a Restore at this time unless you're having issues. Without removing old system restore points you would potentially restore an infection. I would recommend removing all old restore points, then create a new one now so that you know it's clean.

Restore

  1. Right-click the Start  button, then select Control Panel > System and Maintenance > Backup and Restore.
  2. Do one of the following:
    • To restore your files, choose Restore my files.
    • To restore the files of all users, choose Restore all users' files.
  3. Do one of the following:
    • To look through the contents of the backup, select Browse for files or Browse for folders. When you're browsing for folders, you won't be able to see the individual files in a folder. To view individual files, use the Browse for files option.
    • To search the contents of the backup, select Search, type all or part of a file name, and then select Search.

 

Thanks

Ron

 

 

Link to post
Share on other sites

  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread.

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.