Issue with dllhost.exe*32 Processes & Powelik, adclicker

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by KenInGA, Oct 23, 2014.

  1. KenInGA

    KenInGA Private E-2

    Hello. I am a new member. I found your site from a google search on a problem I am having with adclicker and poweliks and apparently related multiple dllhost.exe*32 processes running on my machine. My problem appears nearly identical to that described by KINGOKRAP in his thread titled "Multiple 'dllhost.exe*32' process showing up in task manager". KESTREL13! appears to have solved his problem. Being a new member, I was unsure whether to create a new thread or attach my problem to KINGOKRAP's thread. Started a new thread but please direct me if I should do
    otherwise.

    A quick rundown on my system:
    o Computer/OS: Dell 8700, Windows 7 Professional, 64 bit, 8Gb memory.
    o Security: Norton Internet Security (firewall, virus protection running live)
    o Disk Emulation: None
    o Display of hidden, system files, folders turned on.

    Steps taken so far to try to solve the problem:
    o Downloaded and run "SpyHunter" and "Spybot". Neither solved the problem.
    o Delete all dllhost.exe*32 processes when they appear in TaskManager. Processes always eventually reappear and swamp my network.
    o Usually on a restart, Norton notifies me of blocking Trojan/Powelik and/or Trojan/adclicker

    Preliminary Steps from "Read Me First" Thread:
    o Downloaded CCleaner and ran "run cleaner"
    o Ran "Windows OS Specific Cleaning Instructions for Win7"
    o Attached logs as directed.

    NOTE: Upon execution, TDSSKiller gave the warning "Can't initialize log". Another window opened showing:
    "Reboot is required. Extended monitoring driver is required for more advanced threats detection. Press 'Reboot Now' button to install driver & reboot, or 'continue' to run the program in standard mode."
    From the posted instructions I was not sure what to do so I pressed the continue button for standard mode. Then got the message "Can't load driver". I hit OK. Results showed no threats and the "report" log was empty, thus no log for TDSSKiller attached. Please advise if I need to rerun TDSSKiller with different procedure.

    Though I see some similarities between my problem and those of "kingokrap", I have done nothing to repair the problem pending instructions from one of you experts. Thanks in advance for your help.

    Ken
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Hi there and a warm welcome to the forums. :)

    You have indeed done the right thing by beginning your OWN thread. You would not have been able to post in Kingocrap's thread anyway.

    Reviewing the logs, will get back to you in a little while.
     
  3. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:

    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\0171821398714864mcinstcleanup (C:\Users\NOLANK~1\AppData\Local\Temp\017182~1.EXE -cleanup -nolog) -> Found
    • [Hidden.From.SCM] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wgkknd (System32\drivers\defba.sys) -> Found
    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\0171821398714864mcinstcleanup (C:\Users\NOLANK~1\AppData\Local\Temp\017182~1.EXE -cleanup -nolog) -> Found
    • [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\0171821398714864mcinstcleanup (C:\Users\NOLANK~1\AppData\Local\Temp\017182~1.EXE -cleanup -nolog) -> Found
    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-2692835088-2736448579-1135027119-1003\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.




    Please disable all anti-virus and anti-spyware programs while we do the following (re-enable when you are finished):

    Run C:\MGtools\analyse.exe by double clicking on it (Note: if using Vista, don't double click, use right click and select Run As Administrator). This is really HijackThis (select Do a system scan only) and select the following lines but DO NOT CLICK FIX until you exit all browser sessions including the one you are reading in right now:

    • O6 - HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel present
    • O16 - DPF: {4ED9DDF0-7479-4BBE-9335-5A1EDB1D8A21} -
    • O22 - SharedTaskScheduler: Browseui preloader - {438755C2-A8BA-11D1-B96B-00A0C90312E1} - (no file)
    After clicking Fix exit HJT.


    Delete these:
    • C:\ProgramData\LwwhgkIu
    • C:\Windows\tasks\ParetoLogic Registration3.job



    Download Cleano 0.61

    Download it to your desktop, Right click the cleano.exe file and run as admin > and place check marks in the boxes as follows (click on link below to see image)

    View attachment 148092
    Click clean now and exit the program.



    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    Re run RogueKiller (just a scan) and attach log.


    Run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running!
     
  4. KenInGA

    KenInGA Private E-2

    Kestrel13!

    Followed all instructions and here are results.

    o Initial exec of RogueKiller:
    Found and deleted 4 of 5 items listed. One item below from your list was not in the new RK scan list:
    [Hidden.From.SCM] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\wgkknd (System32\drivers\defba.sys) -> Found

    o Executed each of the remaining items and generated logs as required. Each log is attached.

    Note log from final exec of RogueKiller contains "Poweliks" registry entry.

    Did not reboot system, still seeing dllhost.exe*32 com processes starting.

    Will reboot and report back status after reboot.


    Ken
     

    Attached Files:

  5. KenInGA

    KenInGA Private E-2

    Kestrel13!

    Followup from previous my response. Rebooted system. Task manager still shows dllhost.exe*32 processes starting.

    No notices from Norton yet re Poweliks or adclicker but that is not unusual. These notices come sporadically.

    One other thing that I have noticed that may or may not be related. I have noticed that sometimes I get a message that "security settings will not allow downloading a file". When I check my Internet Explorer Security Settings for the Internet, I see that they have been reset. I then reset them to the default. At some time later, during the same session they get reset again. This is a new phenomena, though I am not sure it coincides with the dllhots.exe*32/Poweliks/adclicker problem. Just for you info.

    I will await your further instructions.

    Thanks,

    Ken
     
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] Fix item using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate this detection:

    • [Tr.Poweliks] (X64) HKEY_USERS\S-1-5-21-2692835088-2736448579-1135027119-1003\Software\classes\CLSID\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\LocalServer32 -> Found

    Place a checkmark next to this item, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.



    Did you not try and delete the temp files I asked you about?

    • Re run RogueKiller yet again, attach new log.
    • Let me know about the temp files....
     
  7. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    Yes, I did delete the temp files using Cleano 0.61 as you instructed.

    Reran RK and deleted the Powelik registry entry. I immediately received a warning from Norton that it had blocked attacks by Poweliks and adclicker. Rebooted system. After logging in, again received Norton warnings about Poweliks and adclicker. dclhost.exe*32 processes also started again.

    Attached RogueKiller logs before/after deletion.

    Note Poweliks entry in registry has reappeared.

    One other comment. When RK was executed it opened at window in IE with info regarding RK and Poweliks. Comments from users with similar problems to mine are interesting. I have taken no action from that page, just for your info.


    Ken
     

    Attached Files:

  8. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I think your anti virus in hidering us and preventing the fix from implementing. You should disable it whilst you run RogueKiller. Failing that you could perhaps try manually deleting it from the Windows Registry.

    Then of course - after whatever action you take, rescanning again with RogueKiller and attaching log.
     
  9. KenInGA

    KenInGA Private E-2

    Reran RK with Norton Virus/malware turned off. Deleted poweliks entry. Rebooted. Reran RK. poweliks reappeared as did dllhosts*32 processes.

    Logs attached.

    I am not all that familiar with manual deletion of registry entries. If you think that is what I should do, please guide me.

    Thanks,

    Ken
     

    Attached Files:

  10. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Right, log into this account and follow the same RogueKiller instructions:

    • Nolan K Snead
     
  11. KenInGA

    KenInGA Private E-2

    All procedures that I have executed up to this point have been under that login account.

    One other note. All procedures conducted with normal boot from windows, not in safe mode. I assume that is what I should have been doing.

    Ken
     
  12. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    Follow-up info.

    I went back and looked at the RogueKiller web page about Poweliks: http://www.adlice.com/poweliks-removal-with-roguekiller/

    I noticed the notes near the top of the page:

    If you have difficulties to remove that threat, try this:
    •1- Do a scan with RogueKiller. Do not close the window.
    •2- Kill all dllhost.exe processes (for example with Process Explorer, kill tree
    •3- Do the removal with RogueKiller
    •4- Reboot immediately

    I tried this and it may have worked. Note that I rebooted without first closing RogueKiller. After the reboot, RK did not show the Poweliks entry in the registry. I rebooted again, still no Poweliks entry in the registry. So far the dllhost.exe*32 processes are not starting. This has held so far for about 45 minutes. I will continue to monitor and get back to you in a few hours if it reappears.

    Thanks,

    Ken
     
  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Do another scan then and attach the latest log. :) Glad it's looking good.
     
  14. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    So far so good. Still no entry for Poweliks in registry and dllhost.exe*32 processes are not starting after about 4.5 hours.

    Just reran RogueKiller and attached log.

    One thing I have noticed on the last several exec of RK is that during the initialization process it kills two processes. You will see these at the top of the log. This now happens every time I executive RK. This does not appear to have been happening in the earlier scans. Something to worry about?

    Is it time now to go back and reset some of the things that may have been changed at the beginning of this process? For example, the UAC is still disabled. Complete Items 6 & 7? (at http://forums.majorgeeks.com/showthread.php?t=139681) or other procedures you can direct me to?

    Thanks,

    Ken
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Please download GMER and save it to your desktop:

    • Unzip (extract) it to your desktop.
    • Disconnect from Internet and close all running programs.
    • There is a small chance this application may crash your computer so save any work you have open.
    • Double-click gmer.exe to run it.
    • Let the gmer.sys driver to load if asked.
    • If it gives you a warning at program start about rootkit activity and asks if you want to run a scan... click NO.
    • Click the Rootkit tab.
    • Make sure all the boxes on the right of the screen are checked, EXCEPT for "Show All".
    • Then click the Scan button. Wait for the scan to finish.
    • Once done, click the Copy button.
    • This will copy the results to the clipboard. Open Notepad and press CTRL + V to paste the log, and save it to your desktop. Attach this log to your next reply.

    NOTE: If you're having problems with running gmer.exe, try it in Safe Mode. This tool works in Safe Mode whereas many other rootkit revealers do not.
     
  16. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    Downloaded and executed GMER as directed. Log attached. One note about the boxes checked on right side. The "quick Scan" only box was checked as default and that is what I used.

    Ken
     

    Attached Files:

  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I would say everything is fine. Have you ran a full system scan with Norton? Would be a good idea, let me know if it finds anything. :)
     
  18. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    Ran Norton, only found cookies and it removed them. However, I am noticing other strange activity.

    I am seeing a lot of unexplained network activity again although there are no dllhost.exe*32 processes running. I noticed quite a few svhost.exe processes running which I know can be normal. I watched them for a while and noticed that a couple of these processes, both identified as svhost.exe*32 were apparently doing a lot of network traffic. I decided to run RogueKiller to see what it would do. As I indicated in an earlier post, it killed 4 processes, 2 of which look to have been the two svhost.exe*32 processes. The network traffic immediately stopped. However, within a few minutes they had restarted and the network traffic resumed. I ran RogueKiller again, it again killed the processes. I did not save the reports for either of these scans but I reran RK again (once again it killed the svhost.exe*32 process, this time there was only one running). The report from the last RK run is attached.

    I believe the killed process "C:\Windows\SysWow64\svchost.exe" is probably the one identified in the Task Manager as svhost.exe*32.

    Suggestions?

    Ken
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Ok, pretty much the only options we have at the moment are for you to run the below tool. If that finds nothing, then I will have you do the whole R&R again. We'll see what happens afterwards...


    To enter System Recovery Options from the Advanced Boot Options:
    • Restart the computer.
    • As soon as the BIOS is loaded begin tapping the F8 key until Advanced Boot Options appears.
    • Use the arrow keys to select the Repair your computer menu item.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account and click Next.

    To enter System Recovery Options by using Windows installation disc:

    • Insert the installation disc.
    • Restart your computer.
    • If prompted, press any key to start Windows from the installation disc. If your computer is not configured to start from a CD or DVD, check your BIOS settings.
    • Click Repair your computer.
    • Choose your language settings, and then click Next.
    • Select the operating system you want to repair, and then click Next.
    • Select your user account an click Next.
    On the System Recovery Options menu you will get the following options:
    • Select Command Prompt
    • In the command window type in notepad and press Enter.
    • The notepad opens. Under File menu select Open.
    • Select "Computer" and find your flash drive letter and close the notepad.
    • In the command window type e:\frst.exe (for x64 bit version type e:\frst64) and press Enter
    • Note: Replace letter e with the drive letter of your flash drive.
    • The tool will start to run.
    • When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) on the flash drive. Please attach this log to your next reply. (How to attach)
     
  20. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    I went thru your instructions down to the execution of e:\frst64.exe. I then realized that I did not know where frst64.exe came from. My understanding of your notes is that it should be on my flash drive. How do I get it there?

    Sorry if I missed something, just set me straight.

    Thanks,

    Ken
     
  21. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    More info. Just for fun :-D I decided to run a SpyHunter scan. It found quite a few cookies but also found two scheduled tasks which it could not identify as either good or bad. It suggested disabling them if I did not know where they came from. I have no idea where they came from so I decided to disable both of them and see what happens. That was about 45 min. ago. Did a restart also. So far the svhost processes that were swamping my network have not started. I will watch and wait. Post back tomorrow with status.

    For your info the paths to the two scheduled tasks are:
    c:\Windows\system32\imquo.dll
    c:\Windows\system32\zhbjexp.dll

    Recognize either of these?


    Ken
     
  22. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Hello, KenInGa

    Please download frst64.exe and save it to your flash drive.
    Farbar Recovery Scan Tool x64
     
  23. KenInGA

    KenInGA Private E-2

    Since disabling the 2 scheduled tasks, still no sign of the excessive network traffic from the svhost processes. I have also not seen either of them starting. I will hold off on running the frst64.exe unless you think I should go ahead anyway. So far it looks like disabling the scheduled tasks found by SpyHunter fixed the problem. I would still like to know if anyone can identify the two dll's I listed in last post so that I might figure out where they came from. Google search has not found anything.

    Info from the task scheduler: The "Action" to start the two tasks are shown as
    C:\Windows\system32\regsvr32.exe/s "C:\Windows\system32\zhbjexp.dll"
    C:\Windows\system32\regsvr32.exe/s "C:\Windows\system32\imquo.dll"

    When I look at the directory (c:\Windows\system32\) from Windows Explorer I am not able to see either of the dll's (imquo or zhbjexp). Anyone have an explanation for this? (Hidden files and folders is turned "on").

    Thanks,

    Ken
     
  24. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    It's very simple, malware likes to hide. I would like you to go ahead and run FRST please. :)
     
  25. KenInGA

    KenInGA Private E-2

    Followed link posted by dr.moriarty to http://www.bleepingcomputer.com/download/farbar-recovery-scan-tool/dl/82/ for download of frst64.exe.

    When I tried to download it I got a security message that the file was dangerous but I went ahead with the download. Norton then sent me a message that the file was dangerous and deleted it from my system.

    Got to admit that I am gunshy these days. Just want to make sure that I am downloading the correct file and that it is safe. What should I do?

    Ken
     
  26. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Yes it's safe. ;)
     
  27. KenInGA

    KenInGA Private E-2

    Procedure for frst64 completed. Log file attached. Note that I have change all of my system's user ID's to generic forms (UID1, UID2, ADMIN) . Uniqueness maintained.

    Ken
     

    Attached Files:

  28. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

    Attached is fixlist.txt
    • Save fixlist.txt to your flash drive.
    • You should now have both fixlist.txt and FRST64.exe on your flash drive.

    Now re-enter System Recovery Options.
    Run FRST64 and press the Fix button just once and wait.
    The tool will make a log on the flashdrive (Fixlog.txt).
    Please attach this to your next message. (How to attach)

    Now boot Windows normally.
    Everything running nicely still?
     

    Attached Files:

  29. KenInGA

    KenInGA Private E-2

    Reran frst64.exe as instructed with fixlist.txt on flash drive. Resulting Fixlog.txt attached. Note as with previous log, user ID modified to generic UID1. Otherwise unchanged. I also noticed that the fixlist.txt you sent was removed from the flash drive after execution of frst64. Assume this is okay.

    One other comment that might be relevant. For a while now I have been noticing pop-ups occurring occasionally within both IE and Firefox. I have not been paying much attention to them until yesterday. Each one occurs when I mouse over something on the screen like highlighted text such as in this forum. Each pop-up has "Ad Choices" shown in the upper right hand corner of the ad. I have looked in my Programs list in the control panel as well as the add-ons in IE/Firefox and found nothing. My onboard scans (Norton, Spyhunter, or SpyBot) have shown anything that is clearly related to these ad's. Do you think this is related to my other problems and how do I get rid of them?

    Otherwise, the dllhost.exe*32 and svhost processes swamping my network still seam to be at bay.

    Thanks,

    Ken
     

    Attached Files:

  30. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Good evening. I have had you run an awful lot of tools, and removed what malware was there. About the "ad choices" ....

    Not a malware problems. These are just mouse over ads that popup when your mouse moves over various underlined keywords. Many websites, including Major Geeks, use these as a source of revenue to help offset costs of running a free website and forums like this.

    And if you are still worrying about dllhost.exe*32 you should be running something like Process Explorer to further investigate. I doubt it's relating to malware, and because of that, you can further discuss it in the software forum. :)


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Press and hold the Windows key [​IMG] and then press the letter R on your keyboard. This opens the Run dialog box.
      • Copy and paste the below into the Run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    4. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    5. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    8. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    9. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     
  31. KenInGA

    KenInGA Private E-2

    Kestrel13!,

    I think I have cleaned up everything as you directed. If I run across anything strange that might be related, I will let you know.

    So far my system seems to running fine, none of the dllhost or svhost issues for a couple of days. No warnings from Norton about Poweliks or adclicker either.

    Thanks so much for your time and effort. I certainly appreciate it.:)

    Ken
     
  32. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're welcome, Ken. :)
     
  33. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Is everything still running nicely (I'm curious) This infection is proving more and more difficult to remove and I am left wondering whether my fix was enough.
     
  34. KenInGA

    KenInGA Private E-2

    I've been away for a few days but my system still seems to be running okay. So far none of the symptoms I experienced have reappeared, including no reports from Norton re. Poweliks or adclicker.:)

    Do you know if any of the major "live" virus software packages can catch this stuff? They have become such a problem, I would think the big boys like Norton would be getting a lot of heat to catch them before they get into a system.

    Thanks for checking.

    Ken
     
  35. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    I'm glad to hear things are running well, if you want me to investigate further still, do this:

    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

    Note: Make sure you download the correct version for your PC. Only the correct version will work.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  36. KenInGA

    KenInGA Private E-2

    Thanks for your continued interest. Since everything seems to be running fine, I will hold off on any further procedures. However, I will certainly let you know if anything new crops up.

    For your info, I was curious if Norton had anything going on this stuff and found the following page:

    http://www.symantec.com/security_response/writeup.jsp?docid=2014-080408-5614-99&tabid=3

    The interesting part of the manual procedure is the stopping of the dllhost.exe processes altogether while removing the virus. This makes sense because the dllhost.exe*32 processes appeared to replace the virus whenever it was deleted, making it very hard to remove completely. This is a tad above my technical expertise but it may make perfect sense to you. I have not done anything with their procedure as yet but I might give it a try just to see if it finds anything at all.

    Thanks again for all of your help and attention.

    Ken
     
  37. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Interesting. Yes, we prefer users here to have poweliks removed using our tools. Manual removal can be a little intimidating for some.

    I do not suggest that you follow those Norton procedures... you may do damage if all is well. If still curious, and still want to try Norton instructions, please run mine first, at least we can estabilish whether or not poweliks is still there, which I doubt anyway, but like to be safe. ;)
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds