Help with DAODx.exe & Pum.policies

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by tcpankratz, Sep 4, 2014.

  1. tcpankratz

    tcpankratz Private E-2

    I need some help. I have been having problems with my computer for a few months with blue screens and Firefox crashing randomly. Avast found a Malware file on the computer and protected me (2 days ago). I then ran all the programs in the Malware instructions and attached the files to this post.

    I uninstalled firefox before I started the cleaning process. Each time my computer wakes up from sleep or restarts the DAODx.exe is found running. What should I do next?

    Thanks for your help,

    Tony

    Computer:
    - AMD FX-6300 six core
    - 4 Gb memory
    - 64 bit operating system
    - ASUS mother board
    - ATI graphics board
    - 3 hard drives attached
     

    Attached Files:

  2. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Welcome to MajorGeeks, tcpankratz.

    http://www.systemlookup.com/Startup/23657-DAODx_exe.html
    Filename: DAODx.exe
    Description: Related to Asus motherboards and is part of the Realtek Gigabit ethernet controller install package. Disabling this process may result in failure to connect to the internet through this device.
    Located in %windir%​

    *The policies reported by RogueKiller are not problems.

    Re-run HitmanPro and fix these detections:
    Malware remnants
    Potential Unwanted Programs


    Ignore all other detections.
    Afterwards, click the Next button.
    HitmanPro may want to reboot the PC in order for the changes to take affect, please do so.
    After reboot and when you are back in Windows, run another scan with HitmanPro and then attach the latest HitmanPro log

    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Files
    C:\Windows\TEMP\*.*
    C:\Users\pankratz\AppData\Local\Temp\*.*
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large [​IMG] button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.

    Next download AdwCleaner by Xplode and save to your Desktop.
    • Double click on AdwCleaner.exe to run the tool.
      Vista/Windows 7/8 users right-click and select Run As Administrator
    • Click on the Scan button.
    • AdwCleaner will begin...be patient as the scan may take some time to complete.
    • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R#].txt) will open in Notepad for review (where the largest value of # represents the most recent report).
    • The contents of the log file may be confusing. Unless you see a program name that you know should not be removed, don't worry about it. If you see an entry you want to keep, let me know about it.
    • Attach the logfile to your next next reply.
    • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.

    Tell me how the machine is running now.
     
  3. tcpankratz

    tcpankratz Private E-2

    Thanks for the help.

    I performed all the tasks. Attached are the log files. I did not clean anything using the adwcleaner yet.

    Regards,

    Tony
     

    Attached Files:

  4. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You're welcome

    Re-run AdwCleaner.exe
    • Click on the Scan button
    • When the scan is ready click on the Clean button
    • A log file will automatically open after the scan has finished
    • Please attach the log file, located at C:\AdwCleaner[S0].txt

    *You forgot to tell me how the machine is now running!
     
  5. tcpankratz

    tcpankratz Private E-2

    The computer seems to be running fine now. No blue screens so far. I will let you know if anything returns.

    Attached is the file requested.

    I really appreciate your help.

    Tony
     

    Attached Files:

  6. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    :)

    Give it a good workout. I"ll post final instructions in the early afternoon, if all is still good.

    dr.m
     
  7. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    * If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware. It provides no "real-time" protection unless you purchase it and does not use any significant amount of resources ( except a little disk space ) until you run a scan.
    2. Go back to step 4 of the READ ME and re-enable your Disk Emulation software with Defogger if you had disabled it.
    3. If running Vista or Win 7, it is time to make sure you have re-enabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    4. Go to add/remove programs and uninstall HijackThis.
    5. Go to the C:\MGtools folder and find the MGclean.bat file. Double click on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and/or deleted.
    7. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work through the below link:
    Safe surfing! [​IMG]
     
  8. tcpankratz

    tcpankratz Private E-2

    I scanned the computer one more time using Malware bytes and this is what it found. Is this still a problem.

    the only thing that I did was re-install fire fox on the machine.

    FYI: I also had a blue screen happen again. I used memtest 86+ and found that one of the sticks of memory had errors. I removed the bad stick and am running on 2 GB now. I made sure it was not slot dependent and it followed the memory stick. I think this will take care of the blue screen problem.

    Thanks,

    tony
     

    Attached Files:

  9. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Nice work solving the cause of the BSOD's.

    Any of the above noticed? If not, using Windows Explorer just delete the folder C:\Program Files (x86)\Deal Keeper.
     
  10. tcpankratz

    tcpankratz Private E-2

    Yes the boxes appear on the bottom of IE.

    Tony
     
  11. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    Did you have MalwareBytes delete the detection?

    Using "Programs and Features" uninstall Deal Keeper if it is found.

    Run AdwCleaner again using my instructions in my first post to "Scan", create a new log and attach it.

    Use the following to reset your browser.
    Reset Internet Explorer 9, 10, and 11 to Defaults
     
  12. tcpankratz

    tcpankratz Private E-2

    No. I did not delete the detection with Malwarebytes. However, I miss read your email and cleaned it first thing this morning.

    Here is what I did:
    - clean detection with Malwarebytes
    - Ran Adwcleaner and attached log
    - re-ran Malwarebytes and there was no detection. (attached)
    - IE does not have the popups any more.
    - Deal Keeper was not installed on the computer as a program.
    - reset IE as instructed.

    I think all is working fine now.

    I appreciate your help.

    Tony
     

    Attached Files:

  13. dr.moriarty

    dr.moriarty Malware Super Sleuth Staff Member

    You're welcome, Tony

    Your system is clean(ed) again. ;)
    dr.m
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds