Slow Laptop getting errors?

Discussion in 'Malware Help (A Specialist Will Reply)' started by bige7769, Nov 2, 2014.

  1. bige7769

    bige7769 Private E-2

    Hello, ran all the scans and have every log cept the TDSSKiller one never gave me one or an option for one.

    My issues are programs coming up and running very slowly. below is a list of what i have seen come up.

    COM Surrogate
    Trojan.Powelick
    Trojan.Adclicker Activity
    Powershell...this comes up alot

    thanks in advance
     

    Attached Files:

  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Welcome to Major Geeks!

    Please download the latest version of Farbar Recovery Scan Tool and save it to your desktop.

    Note: Make sure you download the 64 bit version for your PC.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  3. bige7769

    bige7769 Private E-2

    Sorry took so long was at work all day, plus when i tried to run it norton wouldnt let me so i shut it down for now. Thanks for the welcome I have been here before but lost my info lol here is the logs below

    thanks again
     

    Attached Files:

  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Your FRST.txt log is incomplete. Did you edit this file?
     
  5. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    NOTE: This script was written specifically for this user for use on this particular computer. Running this on another machine may cause damage to your operating system.


    Download this >> View attachment fixlist.txt

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
    Now run the C:\MGtools\GetLogs.bat file by double clicking on it (Note: if using Vista or Win7, don't double click, use right click and select Run As Administrator).

    Then attach the below logs:
    • Fixlog.txt
    • C:\MGlogs.zip
    Please attach the above two log first before you continue with the below.
    Also at this point, I want to double check the status of Poweliks by having you run another scan with FRST like in my last message and attach the new FRST.txt and Addition.txt logs.
     
  6. bige7769

    bige7769 Private E-2

    never messed with it but ill run it again and post those logs
     

    Attached Files:

  7. bige7769

    bige7769 Private E-2

    it only gave me a new FRST.txt
     

    Attached Files:

  8. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    No matter! Per the FRST.txt log we appear to have fixed the primary source of your problem which was a Poweliks infection. Now let's cleanup a little more junk.


    Please download OTM by Old Timer and save it to your Desktop.
    • Run OTM.exe by double clicking on it (Note: if using Vista, Win7 or Win8, don't double click, use right click and select Run As Administrator).
    • Copy the lines from the below codebox to the clipboard by highlighting ALL of them and pressing CTRL + C
      (or, after highlighting, right-click and choose Copy): Do not include the word Code: which is just a title line of
      the code box
    Code:
    :Processes
    explorer.exe
     
    :Files
    2014-11-03 19:22 - 2014-11-03 19:22 - 40034920 ____T () C:\Windows\SysWOW64\00028079.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 40034920 ____T () C:\Windows\SysWOW64\00016376.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 40034920 ____T () C:\Windows\SysWOW64\00013790.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00031365.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00031090.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00030964.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00030783.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00030627.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00030221.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00030114.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00029885.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00029878.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00029720.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00029625.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00029203.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00028685.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00027566.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00027292.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00026381.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00026282.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00025905.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00024374.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00024319.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00023201.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00022220.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00020929.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00020508.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00019216.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00018417.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00018350.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00018196.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00017971.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00017246.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00017225.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00015030.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00013505.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00013497.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00012842.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00011901.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00011718.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00011037.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00010368.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00009897.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00009527.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00009416.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00009283.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00008280.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00007375.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00006946.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00006744.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00006067.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00006048.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00004686.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00003435.tmp
    2014-11-03 19:22 - 2014-11-03 19:22 - 01176168 ____T () C:\Windows\SysWOW64\00002220.tmp
    2014-11-03 17:54 - 2014-11-03 17:54 - 00345192 _____ () C:\Windows\Minidump\110314-32136-01.dmp
    2014-11-03 16:48 - 2014-11-03 17:54 - 585135333 _____ () C:\Windows\MEMORY.DMP
    :Commands
    [purity]
    [EmptyTemp]
    [start explorer]
    [Reboot]
    • Return to OTM, right click in the Paste List of Files/Folders to Move window (under the yellow bar
      ) and choose Paste.
    • Now click the large http://forums.majorgeeks.com/chaslang/images/MoveIt!.png button.
    • If OTM asks to reboot your computer, allow it to do so. The report should appear in Notepad after the reboot.
    • Close OTM.
    Now navigate to the C:\_OTM\MovedFiles folder ( assuming your Windows drive is C). This is where your log will be
    saved in the form of Date and Time mmddyyyy_hhmmss.log. Just look for the most recent .log file. Attach
    this log file to your next message.

    Now please download Junkware Removal Tool to your desktop.
    • Shut down your protection software now to avoid potential conflicts.
    • Run the tool by double-clicking it. If you are using Windows Vista or Seven, right-mouse click it and select Run as Administrator.
    • The tool will open and start scanning your system.
    • Note: That JRT may reset your home page to a google default so you will need to restore your home page setting if this happens.
    • Please be patient as this can take a while to complete depending on your system's specifications.
    • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
    • Attach JRT.txt to your next message.
    Then attach the below logs:
    • the C:\_OTM\MovedFiles log
    • the JRT.TXT log
    Make sure you tell me how things are working now! They should be good now.
     
  9. bige7769

    bige7769 Private E-2

    seems to be running better woohoo
     

    Attached Files:

  10. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Excellent. Your logs are clean.


    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Renable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. If you are running Win 8, Win 7, Vista, Windows XP or Windows ME, do the below to flush restore points:
      • Refer to the instructions for your WIndows version in this link: Disable And Enable System Restore
      • What we want you to do is to first disable System Restore to flush restore points some of which could be infected.
      • Then we want you to Enable System Restore to create a new clean Restore Point.
    8. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds