Computer running slow....Ran recommended virus scans and have attached logs

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by runfromabear, Sep 5, 2014.

  1. runfromabear

    runfromabear Private First Class

    My computer has been running very slow for the last week or so and I had some time this morning so I thought I would run the virus scans recommended on this site. I have attached them below

    I was not able to run the malwarebytes. I downloaded the program, but as I tried to install and run it I kept getting the following error:

    internal error: expression error "runtime error (at 79:177):
    external exception E06D7363


    And the program would not open and run. (I did rename it, as instructed, when I downloaded) it.

    I have attached the rest of the logs. Is there any sign of some viruses that might be slowing my computer down? Oh, I am running a Dell Vostro 3700 laptop, with a 32 bit windows 7 operating system.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Before we continue I would like for you to use MSConfig to put this machine back into normal start up mode if not already.


    Settings Manager <<< Please uninstall this.



    Download and run OTM.

    Download OTM by Old Timer and save it to your Desktop.

    • Right-click OTM.exe And select " Run as administrator " to run it.
    • Paste the following code under the [​IMG] area. Do not include the word Code.
    Code:
    :Files
    C:\Users\brent\AppData\Local\Linkey
    C:\Users\brent\Downloads\SoftonicDownloader_for_sketchup-make-2014.exe
    C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JJA9STWJ\WSSetup[2].exe
    C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JJA9STWJ\WSSetup[3].exe
    C:\$Recycle.Bin\S-1-5-21-1815196250-2127635106-2665615271-1000\$RJY35HH.exe
    C:\Program Files\SearchProtect
    C:\Users\brent\AppData\Roaming\SearchProtect
    C:\Program Files\Conduit
    C:\Program Files\MyPC Backup
    C:\Program Files\Settings Manager
    C:\Program Files\Tbccint
    C:\ProgramData\APN
    C:\ProgramData\Babylon
    C:\ProgramData\Conduit
    C:\ProgramData\systemk
    C:\Users\brent\AppData\Local\Babylon
    C:\Users\brent\AppData\Local\Conduit
    C:\Users\brent\AppData\Local\NativeMessaging
    C:\Users\brent\AppData\LocalLow\Conduit
    C:\Users\brent\AppData\LocalLow\Conduit
    C:\Users\brent\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup
    C:\Users\brent\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\MyPC Backup.lnk 
    C:\Users\brent\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\MyPC Backup\Uninstall.lnk 
    C:\Users\brent\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPC Backup.lnk 
    C:\Windows\System32\ARFC
    C:\Windows\System32\WNLT
    
    :reg
    [-HKLM\SOFTWARE\Classes\AppID\escort.DLL]
    [-HKLM\SOFTWARE\Classes\AppID\escortApp.DLL]
    [-HKLM\SOFTWARE\Classes\AppID\escortEng.DLL]
    [-HKLM\SOFTWARE\Classes\AppID\escorTlbr.DLL]
    [-HKLM\SOFTWARE\Classes\AppID\esrv.EXE]
    [-HKLM\SOFTWARE\Classes\AppID\iedll.dll]
    [-HKLM\SOFTWARE\Classes\AppID\{09C554C3-109B-483C-A06B-F14172F1A947}]
    [-HKLM\SOFTWARE\Classes\AppID\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}]
    [-HKLM\SOFTWARE\Classes\AppID\{6A7CD9EC-D8BD-4340-BCD0-77C09A282921}]
    [-HKLM\SOFTWARE\Classes\AppID\{B12E99ED-69BD-437C-86BE-C862B9E5444D}]
    [-HKLM\SOFTWARE\Classes\AppID\{CFDAFE39-20CE-451D-BD45-A37452F39CF0}]
    [-HKLM\SOFTWARE\Classes\AppID\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}]
    [-HKLM\SOFTWARE\Classes\CLSID\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}]
    [-HKLM\SOFTWARE\Classes\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}]
    [-HKLM\SOFTWARE\Classes\CLSID\{4D9101D6-5BA0-4048-BDDE-7E2DF54C8C47}]
    [-HKLM\SOFTWARE\Classes\CLSID\{80922ee0-8a76-46ae-95d5-bd3c3fe0708d}]
    [-HKLM\SOFTWARE\Classes\CLSID\{99066096-8989-4612-841F-621A01D54AD7}]
    [-HKLM\SOFTWARE\Classes\CLSID\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKLM\SOFTWARE\Classes\CLSID\{FE9271F2-6EFD-44b0-A826-84C829536E93}]
    [-HKLM\SOFTWARE\Classes\escort.escortIEPane.1]
    [-HKLM\SOFTWARE\Classes\escort.escortIEPane]
    [-HKLM\SOFTWARE\Classes\I]
    [-HKLM\SOFTWARE\Classes\Interface\{10DE7085-6A1E-4D41-A7BF-9AF93E351401}]
    [-HKLM\SOFTWARE\Classes\Interface\{1AD27395-1659-4DFF-A319-2CFA243861A5}]
    [-HKLM\SOFTWARE\Classes\Interface\{4613B1C1-FBC0-43C3-A4B9-B1D6CD360BB3}]
    [-HKLM\SOFTWARE\Classes\Linkey.Linkey]
    [-HKLM\SOFTWARE\Classes\Prod.cap]
    [-HKLM\SOFTWARE\Classes\s]
    [-HKLM\SOFTWARE\Classes\TypeLib\{4E1E9D45-8BF9-4139-915C-9F83CC3D5921}]
    [-HKLM\SOFTWARE\Classes\TypeLib\{726E90BE-DC22-4965-B215-E0784DC26F47}]
    [-HKLM\SOFTWARE\Classes\TypeLib\{D7EE8177-D51E-4F89-92B6-83EA2EC40800}]
    [-HKLM\SOFTWARE\Conduit]
    [-HKLM\SOFTWARE\Linkey]
    [-HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2476}]
    [-HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASAPI32]
    [-HKLM\SOFTWARE\Microsoft\Tracing\dmwu_RASMANCS]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bitguard.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bprotect.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bpsvc.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browserdefender.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browserprotect.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\browsersafeguard.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dprotectsvc.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\jumpflip]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\protectedsearch.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchinstaller.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchprotection.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchprotector.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchsettings.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\searchsettings64.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\snapdo.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stinst32.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\stinst64.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\umbrella.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\utiljumpflip.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\volaro]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vonteera]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\websteroids.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\websteroidsservice.exe]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{4D9101D6-5BA0-4048-BDDE-7E2DF54C8C47}]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Settings Manager]
    [-HKLM\SOFTWARE\SystemK]
    [-HKLM\SOFTWARE\Tarma Installer\Components\{8D8654CD-7FBC-4C7E-84E9-371BFA8DB04E}]
    [-HKLM\SOFTWARE\Tarma Installer\Components\{9307081B-7444-494C-8CF6-2FA7C0E92BFB}]
    [-HKLM\SOFTWARE\Tarma Installer\Components\{9D9785E5-3424-40B6-A287-BA143AD53109}]
    [-HKLM\SOFTWARE\Tarma Installer\Components\{B6783DFA-B8C8-4CB6-AB9F-EF1A1F7F7AE8}]
    [-HKLM\SOFTWARE\Tarma Installer\Components\{F5F971A9-DBF8-4EEC-81E3-5F1660573E6C}]
    [-HKLM\SOFTWARE\Tarma Installer\Products\{889DF117-14D1-44EE-9F31-C5FB5D47F68B}]
    [-HKLM\SOFTWARE\WNLT]
    [-HKLM\SYSTEM\ControlSet001\services\BackupStack]
    [-HKLM\SYSTEM\ControlSet001\services\eventlog\Application\WajamUpdater]
    [-HKLM\SYSTEM\ControlSet001\services\TBSrv]
    [-HKLM\SYSTEM\ControlSet002\services\BackupStack]
    [-HKLM\SYSTEM\ControlSet002\services\eventlog\Application\WajamUpdater]
    [-HKLM\SYSTEM\ControlSet002\services\TBSrv]
    [-HKLM\SYSTEM\CurrentControlSet\services\BackupStack]
    [-HKLM\SYSTEM\CurrentControlSet\services\eventlog\Application\WajamUpdater]
    [-HKLM\SYSTEM\CurrentControlSet\services\TBSrv]
    [-HKU\.DEFAULT\Software\ImInstaller]
    [-HKU\.DEFAULT\Software\WNLT]
    [-HKU\S-1-5-18\Software\ImInstaller]
    [-HKU\S-1-5-18\Software\WNLT]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\AppDataLow\Software\Conduit]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\AppDataLow\Software\SmartBar]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Conduit]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\IM]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\ImInstaller]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Linkey]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{4D9101D6-5BA0-4048-BDDE-7E2DF54C8C47}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Internet Explorer\Approved Extensions\{54739D49-AC03-4C57-9264-C5195596B3A1}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0B5A3858-6B47-48C4-B3EF-C66200D9278D}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2476}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{4D9101D6-5BA0-4048-BDDE-7E2DF54C8C47}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{54739D49-AC03-4C57-9264-C5195596B3A1}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{4D9101D6-5BA0-4048-BDDE-7E2DF54C8C47}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\Linkey]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Softonic]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\SystemK]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Tbccint_HKLM]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1001\Software\AppDataLow\Software\Conduit]
    [-HKU\S-1-5-21-1815196250-2127635106-2665615271-1001\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DF7770F7-832F-4BDF-B144-100EDDD0C3AE}]
    [-HKLM\SOFTWARE\SearchProtect]
    [-HKLM\SYSTEM\CurrentControlSet\Services\TBSrv]
    [-HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2476}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{0B5A3858-6B47-48C4-B3EF-C66200D9278D}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{9BB47C17-9C68-4BB3-B188-DD9AF0FD2476}]
    [-HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SearchScopes\{CFF4DB9B-135F-47c0-9269-B4C6572FD61A}]
    
    :Commands
    [emptytemp]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar) and choose Paste.
    • Push the large [​IMG] button.
    • OTM may ask to reboot the machine. Please do so if asked.
    • Copy everything in the Results window (under the green bar), and paste it into a text file to ATTACH into your next reply.

    NOTE: If you are unable to copy/paste from this window (as will be the case if the machine was rebooted), open Notepad (Start->All Programs->Accessories->Notepad), click File->Open, in the File Name box enter *.log and press the Enter key, navigate to the C:\_OTM\MovedFiles folder, and open the newest .log file present, and attach the contents of that document back here in your next post.







    [​IMG] Please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.



    • Please re run RogueKiller and Hitman and attach logs from each.
    • Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.
    • Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  3. runfromabear

    runfromabear Private First Class

    So just a quick question. I missed one part of the instructions and did not remove the setting manager at the beginning (sorry about that). I ran the OTM, junk removal program and the rogue killer before I noticed. Should run those a second time.

    Also, how do I get rid of settings manger? I can't seem to find it on my computer. Thanks for the help.
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Just keep going and attach what logs you have please. :)
     
  5. runfromabear

    runfromabear Private First Class

    I ran all the scans....I didn't seem to have any problems with them.

    Only judging by a couple of minutes things seem to be running a little bit faster. Programs are opening quicker and things just seem to generally seem to be a little smoother. Honestly, since there was so specific problem it will be though to tell how much faster it is running until I have consistently used if for a couple of days.

    Not being a computer guy I am just a little curious. Is there any sign that it has been infected with any viruses?

    I have attached the logs from the latest scans.
     

    Attached Files:

  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Just a whole load of junk really.

    Think you attached an OLD log from RogueKiller. Rescan afresh and attach the very newest log please.

    Please download AdwCleaner by Xplode and save to your Desktop.

    • Double click on AdwCleaner.exe to run the tool.
    • Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
     
  7. runfromabear

    runfromabear Private First Class

    I ran the Adware program and reran rogue killer and I believe I have attached the proper logs for both.
     

    Attached Files:

  8. runfromabear

    runfromabear Private First Class

    Also, not sure if this is relevant to what we have been working through or not, but I have been having problems with my Chrome Browser. I will open the initial google page but will when I try to open a web page from there it says that I am not connected to the internet (which I am).

    I reinstalled the browser and am still having the same problem. The issue seems to be with the browser in some way since I can access the internet just fine through the internet explorer browser.
     
  9. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Have adwcleaner remove what it finds. Then you need to run MGTools again. It did not quite run to completion...

    Please try again and this time ensure UAC is disabled, that protection software is disabled and that you are indeed running it as admin. :) Then attach the new MGlogs.zip
     
  10. runfromabear

    runfromabear Private First Class

    Double checked and the UAC is disabled (and restarted). All virus scans and firewalls have also been turned off. Attached are the results of the MG Tools scan.
     

    Attached Files:

  11. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Sigh. Still incomplete. Do this please....
    Please click Start, Run, and enter cmd and click OK. This will open a command prompt window. Enter the below commands at the command prompt each followed by the enter key. The bold black are commands. The purple is merely informational.

    • cd \MGtools <-- this changes to the MGtools folder and the prompt should change to C:\MGtools>
    • nwktst<-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • GetRunKey <-- this will try to run all one scan from MGtools. Tell me what error messages, if any, you see.
    • ShowNew <-- this will try to run all another scan from MGtools. Tell me what error messages, if any, you see.
    • analyse <-- this attempts to run HijackThis. Be sure to click the Accept button twice in the license agreement popup or it will just sit there and wait.
    Now look for the C:\MGlogs.zip file and attach it no matter what happened while doing the above.
     
  12. runfromabear

    runfromabear Private First Class

    Ran the commands prompts and have attached the log

    nwktst<-- Said it was an invalid command
    ShowNew <-- It said access was denied at first, but then it began to scan a few things
    analyse <-- Seemed to work fine, but I didn't need to accept the licensing agreement. It simply asked me if I wanted to do a full system scan or a full system scan that included a log (I chose the latter)
     

    Attached Files:

  13. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Are you absolutely definately set up to use NORMAL start up in MSCONFIG? Can you check please and let me know.

    Now Copy the bold text below to notepad. Save it as fixME.reg to your desktop. Be sure the "Save as" type is set to "all files" Once you have saved it double click it and allow it to merge with the registry.

    Make sure that you tell me if you receive a success message about adding the above
    to the registry. If you do not get a success message, it definitely did not work.

    Now re run RogueKiller.

    Now run the C:\MGtools\GetLogs.bat file by double clicking on it. (Right click and run as admin if using Vista, Windows7 or Win8) Then attach the new C:\MGlogs.zip file that will be created by running this.

    Let me know of any problems you may have encountered with the above instructions and also let me know how things are running now!
     
  14. runfromabear

    runfromabear Private First Class

    I triple checked and yes, under the system configuration I am in normal start up mode.

    Merged the registries and did receive a message that it was successful.

    I also ran the rogue killer again and the MG tools log and have attached the results.
     

    Attached Files:

  15. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    That's not the correct log from MGTools. I need the whole MGlogs.zip
     
  16. runfromabear

    runfromabear Private First Class

    Ok, I might have ran the wrong thing on that last MG Tools scan.

    When I searched my computer I couldn't find the C:\MGtools\GetLogs.bat file. So I ran the Getlogs.bat from the c:\Users\brent\Desktop\MGtools.

    I thought it was what you asked me to run but it didn't create and MGtools.zip folder....just the one I attached.

    Did I run the wrong thing? The good news is that since you had me add to the registry earlier today things do seem to be working a little better.
     
  17. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Glad things are running better. Now you just need to right click and run as admin the MGTools.exe to run it again. Then attach the new MGlogs.zip. :)
     
  18. runfromabear

    runfromabear Private First Class

    Here is the MG Tools log.
     

    Attached Files:

  19. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    [​IMG] Fix items using RogueKiller.

    Double-click RogueKiller.exe to run. (Vista/7/8 right-click and select Run as Administrator)
    When it opens, press the Scan button
    Now click the Registry tab and locate these detections:
    • [Suspicious.Path] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Windows | AppInit_DLLs : C:\Users\brent\AppData\Local\Linkey\IEEXTE~1\iedll.dll -> FOUND
    • [PUM.HomePage] HKEY_USERS\S-1-5-21-1815196250-2127635106-2665615271-1000\Software\Microsoft\Internet Explorer\Main | Start Page : www.google.com -> FOUND
    • [PUM.HomePage] HKEY_USERS\S-1-5-21-1815196250-2127635106-2665615271-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://ca.yahoo.com/?p=us -> FOUND

    Place a checkmark next to each of these items, leave the others unchecked.
    Now press the Delete button.
    When it is finished, there will be a log on your desktop called: RKreport[2].txt
    Attach RKreport[2].txt to your next message. (How to attach)
    Reboot the machine.


    Now rescan with RogueKiller once more and attach both logs when done.
     
  20. runfromabear

    runfromabear Private First Class

    Here are the attached logs from both Rogue Killer scans.
     

    Attached Files:

  21. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove them, you can delete these files now.
    3. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    4. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    5. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    7. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.

    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds