Jump to content

Recommended Posts

  • Root Admin

Hello @MareczekBukoski

Normally you just click through and the program will automatically remove what it found. If you're looking at a log before the process has completed it may be saying the there was No Action.

Simply complete and then the program should restart.

Try the following though and we'll check it out.

 

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 

 

Spoiler

 

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

I've confirmed that the risk-ware files and registry keys were not removed by the program. I re-scanned my computer and they are not being detected. I don't know why there is no option to remove them in the notification area. When you hover over the notification with your mouse pointer,  there a three options.  There is an eye-icon, which gives you the scan report. Then I see a download-symbol, which lets you export the notifications to a text file. And then there is a trash-can symbol which allows you delete the notification. There is NO option to remove the registry key or the files. They just REMAIN there.

I exported to text-file and this is what it said:

Registry Key: 37
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\Application Experience\PcaPatchDbTask, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{400861C4-8427-4A77-B3C8-44A507885173}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{400861C4-8427-4A77-B3C8-44A507885173}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\Application Experience\StartupAppTask, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{3D363385-64B8-4207-AC46-3EE180DD87F2}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{3D363385-64B8-4207-AC46-3EE180DD87F2}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\MAINTENANCE\{3D363385-64B8-4207-AC46-3EE180DD87F2}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\applicationdata\CleanupTemporaryState, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{E003BEA4-7D11-4522-9834-25C3F9F93F53}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{E003BEA4-7D11-4522-9834-25C3F9F93F53}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\MAINTENANCE\{E003BEA4-7D11-4522-9834-25C3F9F93F53}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\AppxDeploymentClient\Pre-staged app cleanup, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{C9ABE41C-5E65-4E52-8BAD-4F1BCA3B5715}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{C9ABE41C-5E65-4E52-8BAD-4F1BCA3B5715}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\MAINTENANCE\{C9ABE41C-5E65-4E52-8BAD-4F1BCA3B5715}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\Autochk\Proxy, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{36A78C3E-A142-4F86-903E-AE26291F646C}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\BOOT\{36A78C3E-A142-4F86-903E-AE26291F646C}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{B97C7632-DD50-4F07-8E4E-F1450795BF78}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{B97C7632-DD50-4F07-8E4E-F1450795BF78}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\MAINTENANCE\{B97C7632-DD50-4F07-8E4E-F1450795BF78}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\SharedPC\Account Cleanup, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{8DB27523-093D-4B93-A00B-68F6317DFAE1}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{8DB27523-093D-4B93-A00B-68F6317DFAE1}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\MAINTENANCE\{8DB27523-093D-4B93-A00B-68F6317DFAE1}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\StateRepository\MaintenanceTasks, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{58CCC4DA-C86D-4E3D-8FAF-A7B24D8F3950}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{58CCC4DA-C86D-4E3D-8FAF-A7B24D8F3950}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\MAINTENANCE\{58CCC4DA-C86D-4E3D-8FAF-A7B24D8F3950}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\Sysmain\WsSwapAssessmentTask, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{638672E6-20F1-499D-BFCC-9EA7935257C4}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{638672E6-20F1-499D-BFCC-9EA7935257C4}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\MAINTENANCE\{638672E6-20F1-499D-BFCC-9EA7935257C4}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\Windows Filtering Platform\BfeOnServiceStartTypeChange, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{86158314-60CF-4F3F-85B5-2399327EA496}, No Action By User, 11812, 941491, , , , , ,
RiskWare.Injector.Generic, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{86158314-60CF-4F3F-85B5-2399327EA496}, No Action By User, 11812, 941491, , , , , ,

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 0
(No malicious items detected)

File: 10
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\Application Experience\PcaPatchDbTask, No Action By User, 11812, 941491, 1.0.40646, , ame, , 9F0ACCD368DEBDA3AA6D8B29423CF3EE, 2E45B19A08F38A948D25B4F8A8459770531DF09A185633D61AE7B9DAC986A1A9
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\Application Experience\StartupAppTask, No Action By User, 11812, 941491, 1.0.40646, , ame, , 0BDE2A4342F763D8A55251395C14AF63, 78C9BB91A173FEC99ED549854EC81DC4768665F6D2CC579495B19205598143C4
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\ApplicationData\CleanupTemporaryState, No Action By User, 11812, 941491, 1.0.40646, , ame, , B97EEB6111E0CAFC5660C41463BB20B4, 592760F890E9BD0BDD4D5F1FD1B67328512C3BAAFBAF2A84597589D4D4606A73
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\AppxDeploymentClient\Pre-staged app cleanup, No Action By User, 11812, 941491, 1.0.40646, , ame, , 39622D5C2D4710EDA8BE8FD1D127EC79, 9308B1A28C4DD92BCE2F2816FCC5362C6A460FA6F558688AF021EC5F750E811D
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\Autochk\Proxy, No Action By User, 11812, 941491, 1.0.40646, , ame, , 072DCBFD73085D1358EBACE36C1EE1F9, 151FD26B9E524C11DCCE8CEDE5107BE2DAFB60F42A0DD6F9976FF589C76ECB94
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\DiskDiagnostic\Microsoft-Windows-DiskDiagnosticDataCollector, No Action By User, 11812, 941491, 1.0.40646, , ame, , A76EA9910F9DCDBF48784B6F05B728AB, C8ED08774B9004E30393EC35D4729B489577C10494E9D855DA38D6A6FFC813EF
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\SharedPC\Account Cleanup, No Action By User, 11812, 941491, 1.0.40646, , ame, , 691CA16FBAA65A6D4983D0949F678F8B, 504A9783D21D5B6F8711FE5F901DD6C60284E677E1A8CA759BD8198F6F614CD5
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\StateRepository\MaintenanceTasks, No Action By User, 11812, 941491, 1.0.40646, , ame, , 183D04307BA05AC13166A073984CC57B, A7E9E380DB7E0CA9A62A5C438AC2B6890287D52D7BB95BF19F410C2ECB77BD30
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\Sysmain\WsSwapAssessmentTask, No Action By User, 11812, 941491, 1.0.40646, , ame, , F1C1C8BDD3D71C4DA978A1703159E4AF, D3152B9140BCB0FC9A88AF2C59DC72D39B72F11B1D5661A6E94AF0A175566E81
RiskWare.Injector.Generic, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\Windows Filtering Platform\BfeOnServiceStartTypeChange, No Action By User, 11812, 941491, 1.0.40646, , ame, , C169971DBB83A272CD3925491D102517, D354CF8F6010392B8DE353107D33E0F01F13273BDB0A21A1A644FC6AD2DCDA83

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)

 

Link to post
Share on other sites

  • Root Admin

This was a False Positive

Please do not delete or if in quarantine do not empty the quarantine

Please run Malwarebytes and check for updates

Then run a scan again.

Let me get some logs please.

 

To begin, please do the following so that we may take a closer look at your installation for troubleshooting:

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to your desktop, please upload that file on your next reply

Thank you

 

Link to post
Share on other sites

  • 1 month later...
  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.