Pc Win 10 Drags & Almost Can't Do Anything

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by SailZoom, Jan 27, 2018.

  1. SailZoom

    SailZoom Private E-2

    I did the 1st step cleaning steps - hitmanpro had no threats I copied mgtools to c:\ and I got an error popup with something like incident detected fix in progress - sorry I thought I could redo that. So I stopped malwarebytes and was going to copy mgtools to c:\ and it says I don't have the privilege. So I coped that to my folder and ran and a dos window popped up and quit with that same error popup. MGtools folder only has this tmpunkey1.txt. When I try to run it from the desktop it gets can't find getlogs.bat
     

    Attached Files:

  2. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Please reopen RogueKiller and remove these items:
    ¤¤¤ Registry : 11 ¤¤¤
    [PUP.Gen1] (X86) HKEY_LOCAL_MACHINE\Software\Viewpoint -> Found
    [PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-1692678041-514304052-3265250291-1001\Software\AppDataLow\Software\adawarebp -> Found
    [PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-1692678041-514304052-3265250291-1001\Software\AppDataLow\Software\adawarebp -> Found
    [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-1692678041-514304052-3265250291-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://goole.com/ -> Found
    [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-1692678041-514304052-3265250291-1001\Software\Microsoft\Internet Explorer\Main | Start Page : http://goole.com/ -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\RK_System_ON_G_35DE\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | TCP Query User{4721F7C6-86ED-48AA-890B-C44C15EBE0A8}C:\users\mike\appdata\local\microsoft\lwaplugin\x86\15.8\lwaplugin.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=6|Profile=Private|App=C:\users\mike\appdata\local\microsoft\lwaplugin\x86\15.8\lwaplugin.exe|Name=lwaplugin.exe|Desc=lwaplugin.exe|Defer=User| [x] -> Found
    [Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\RK_System_ON_G_35DE\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules | UDP Query User{BB358327-8DB0-495D-AD33-BBCF064B753C}C:\users\mike\appdata\local\microsoft\lwaplugin\x86\15.8\lwaplugin.exe : v2.10|Action=Allow|Active=TRUE|Dir=In|Protocol=17|Profile=Private|App=C:\users\mike

    Reboot and download Zemana Malware Removal to your desktop and run it please.
    It auto updates, and you click scan. After it's finished, click on the icon that looks like Cell phone strength bars. High-light the report (by date log was produced) and click on the "Open Report" icon. (looks like a folder). That notepad.txt can then be copied/pasted into another .txt doc and saved. Upload that, please.
     
  3. Mike Z

    Mike Z Private E-2

    I did that and zemana got no threats then I went back and ran adwcleaner again and I think it found some pups?
     

    Attached Files:

  4. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Did you remove what was found by RogueKiller as I asked? If so, let's look a little deeper.

    Please download the latest version of FRST the below link.
    Farbar Recovery Scan Tool and save it to your Desktop.
    Note: Make sure you download the proper version ( 32 bit or 64 bit ) for your PC. Only one will run, the correct one. So it you make a mistake and download the wrong one, go back and get the other.
    • Double-click to run it. When the tool opens click Yes to disclaimer.
    • Press Scan button.
    • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your next reply.
    • The first time the tool is run, it makes also another log (Addition.txt). Please attach it to your reply.
     
  5. Mike Z

    Mike Z Private E-2

    Yes I had roguekiller get rid of them & ran frst64
     

    Attached Files:

  6. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    I am curious...what is this: C:\Users\Akqba?
     
  7. Mike Z

    Mike Z Private E-2

    Don't have C:\Users\Akqba\ or C:\Users\Zn0kcf - I only see users pc maint, public and zmudas. I have this cybereason.com ransomefree thing running that creates some folders in documents to trigger seeing a ransomeware attack. Or It's? If I can't see it how can I get rid of it?
     
  8. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Save fixlist.txt on your Desktop. Make sure you save it as a txt file.
    • You should now have both fixlist.txt and FRST64.exe on your Desktop.
    • Now I want you to disconnect your PC connection to the internet by unplugging the cable ( if it is wireless then temporarily shutdown the wireless network ).
    • Run FRST64.exe by right clicking on it and selecting Run As Adminstrator
    • Click the Fix button just once and wait.
    • Your computer should reboot after the fix runs.
    • Reconnect your internet connection after reboot so you can come back here to continue.
    • The tool will make a log on the Desktop (Fixlog.txt) please attach this new log to your next reply (attach or paste)
     

    Attached Files:

  9. Mike Z

    Mike Z Private E-2

    no fixlist do you mean FRST.txt
     
  10. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    No... I mean the "Fixlist" that I attached to my previous post.
     
  11. Mike Z

    Mike Z Private E-2

    got it
     
  12. Mike Z

    Mike Z Private E-2

    Mike: Ran iy did not reboot so I did
     

    Attached Files:

  13. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Ok...they were both removed. How are things running? It looks like you are malware free.
     
  14. Mike Z

    Mike Z Private E-2

    Seems ok I can even copy mgtools to c:\ again. I am thinking of rerunning the clean steps to see if they get anything then I'll post here. You folks do great work thanks.
     
  15. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    You are welcome. Happy to look at new logs.
     
  16. Mike Z

    Mike Z Private E-2

    So I reran it and I got these logs mgtools ran and got the message it got the previous times it is a popup that does not go away disinfection in progress detected threat is being disinfected please wait until the process is complete. I'm running bitdefender total security 2018 and malwarebytes premium don't think it is doing anything for the popup
     

    Attached Files:

  17. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    MGTools does not remove malware. It only gathers information about your system. I don't know what you are referring to.
     
  18. Mike Z

    Mike Z Private E-2

    Running it gets this popup - disinfection in progress detected threat is being disinfected please wait until the process is complete. Did the logs show anything or should I forget the popup
     
  19. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    MGTools does not create any pop-ups. Please can you get me a screen shot of it?
     
  20. Mike Z

    Mike Z Private E-2

    Pops up everytime I ran and doesn't seem to do anything. Maybe bitdefender or malwarebytes?
     

    Attached Files:

  21. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    Maybe bitdefender....reboot and see if it goes away.
     
  22. Mike Z

    Mike Z Private E-2

    I get rid of it - did any of the logs from the last run show anything?
     
  23. TimW

    TimW MajorGeeks Administrator - Jedi Malware Expert Staff Member

    No....you are clean.

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. Re-enable your Disk Emulation software with Defogger if you had disabled it in step 4 of the READ & RUN ME.
    3. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    4. If running Vista, Win 7 or Win 8 or 10, it is time to make sure you have re-enabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    5. Now go to the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 or 10 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    6. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    7. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds