Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

My Dell Desktop issues


  • Please log in to reply
3 replies to this topic

#1 Kawaiikeke

Kawaiikeke

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:11:33 PM

Posted 02 March 2013 - 09:28 PM

I have a Dell desktop, only a few years old, fairly new. It has gone through a cyclone of viruses and it's basically almost impossible to enjoy now. 

I keep getting blue screen at random times. I also noticed the Privatize virus lurking around. The internet runs slow and sometimes stops working when it wants to.

I had issues when the router would just basically disable and stop streaming internet every two mins. I need this computer back into great health like it was when it was first bought. Can anyone help? The computer is used to pay bills, tumblr, facebook, etc. We also use frostwire which I think adds on to the issues. 


Edited by Budapest, 02 March 2013 - 10:47 PM.
Moved from Win7 ~Budapest


BC AdBot (Login to Remove)

 


#2 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:11:33 PM

Posted 02 March 2013 - 09:45 PM

  • Please download TDSSKiller from here and save it to your Desktop
  • Doubleclick on TDSSKiller.exe to run the application, then click on Change parameters




  • Check Loaded Modules  and Detect TDLFS file systemDo not check Verify file digital signatures (even though it is checked in the example)
  • If you are asked to reboot because an "Extended Monitoring Driver is required" please click Reboot now




  • Click Start Scan and allow the scan process to run

  • If threats are detected select Skip for all of them unless I instruct you otherwise
  • Click Continue




  • Click Reboot computer
  • Please post the contents of  TDSSKiller.[Version]_[Date]_[Time]_log.txt found in your root directory (typically c:\)in your reply


===================================================


aswMBR

--------------------

  • Download aswMBR and save it to your desktop.
  • Please disable your real time protection of any Antivirus, Antispyware or Antimalware programs temporarily. They will interfere and may cause unexpected results.
  • If you need help to disable your protection programs see here and here.
  • Double click the aswMBR.exe file to run it. Please allow when you are asked to download AVAST antivirus engine defs.
  • Wait until the AV update is done, then click on the Scan button to start. The program will launch a scan.



  • When done, you will see Scan finished successfully. Please click on Save log and save the file to your desktop.



  • Please post the contents of the log in your next reply.

NOTE:  aswMBR will create MBR.dat file on your desktop. This is a copy of your MBR. Do NOT delete it.


===================================================


ESET Online Scanner

--------------------

I'd like us to scan your machine with ESET OnlineScan  This process may may take several hours, that is normal

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the   button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)

    • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
    • Double click on the icon on your desktop.

  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:

    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Copy and paste the information in your next reply.   Note:  If no malware was found you will not get a log.
  • Click the Back button.
  • Click the Finish button.


===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • TDSSKiller log
  • aswMBR log
  • ESET results


 



#3 Kawaiikeke

Kawaiikeke
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:11:33 PM

Posted 03 March 2013 - 12:31 AM

TDSS LOG
 
22:22:59.0829 3848  TDSS rootkit removing tool 2.8.16.0 Feb 11 2013 18:50:42
22:23:00.0371 3848  ============================================================
22:23:00.0371 3848  Current date / time: 2013/03/02 22:23:00.0371
22:23:00.0371 3848  SystemInfo:
22:23:00.0371 3848  
22:23:00.0371 3848  OS Version: 6.1.7601 ServicePack: 1.0
22:23:00.0371 3848  Product type: Workstation
22:23:00.0372 3848  ComputerName: HOME-PC
22:23:00.0372 3848  UserName: Home
22:23:00.0372 3848  Windows directory: C:\Windows
22:23:00.0372 3848  System windows directory: C:\Windows
22:23:00.0372 3848  Running under WOW64
22:23:00.0372 3848  Processor architecture: Intel x64
22:23:00.0372 3848  Number of processors: 2
22:23:00.0372 3848  Page size: 0x1000
22:23:00.0372 3848  Boot type: Normal boot
22:23:00.0372 3848  ============================================================
22:23:00.0575 3848  BG loaded
22:23:00.0874 3848  Drive \Device\Harddisk0\DR0 - Size: 0x4A85D56000 (298.09 Gb), SectorSize: 0x200, Cylinders: 0x9801, SectorsPerTrack: 0x3F, TracksPerCylinder: 0xFF, Type 'K0', Flags 0x00000040
22:23:00.0895 3848  ============================================================
22:23:00.0895 3848  \Device\Harddisk0\DR0:
22:23:00.0895 3848  MBR partitions:
22:23:00.0895 3848  \Device\Harddisk0\DR0\Partition1: MBR, Type 0x7, StartLBA 0x14000, BlocksNum 0x1D4C000
22:23:00.0895 3848  \Device\Harddisk0\DR0\Partition2: MBR, Type 0x7, StartLBA 0x1D60000, BlocksNum 0x236CE2B0
22:23:00.0895 3848  ============================================================
22:23:00.0920 3848  C: <-> \Device\Harddisk0\DR0\Partition2
22:23:00.0920 3848  ============================================================
22:23:00.0920 3848  Initialize success
22:23:00.0920 3848  ============================================================
22:23:36.0122 3760  Deinitialize success
 
ASW LOG
 
aswMBR version 0.9.9.1707 Copyright© 2011 AVAST Software
Run date: 2013-03-02 22:20:44
-----------------------------
22:20:44.329    OS Version: Windows x64 6.1.7601 Service Pack 1
22:20:44.329    Number of processors: 2 586 0x170A
22:20:44.331    ComputerName: HOME-PC  UserName: Home
22:20:47.009    Initialize success
22:25:52.143    AVAST engine defs: 13030201
22:26:46.044    Disk 0 (boot) \Device\Harddisk0\DR0 -> \Device\Ide\IAAStorageDevice-1
22:26:46.048    Disk 0 Vendor: ST332041 CC45 Size: 305245MB BusType: 3
22:26:46.070    Disk 0 MBR read successfully
22:26:46.074    Disk 0 MBR scan
22:26:46.081    Disk 0 Windows 7 default MBR code
22:26:46.086    Disk 0 Partition 1 00     DE Dell Utility Dell 8.0       39 MB offset 63
22:26:46.094    Disk 0 Partition 2 80 (A) 07    HPFS/NTFS NTFS        15000 MB offset 81920
22:26:46.109    Disk 0 Partition 3 00     07    HPFS/NTFS NTFS       290204 MB offset 30801920
22:26:46.142    Disk 0 scanning C:\Windows\system32\drivers
22:26:58.939    Service scanning
22:27:25.515    Modules scanning
22:27:25.528    Disk 0 trace - called modules:
22:27:25.552    ntoskrnl.exe CLASSPNP.SYS disk.sys iaStor.sys hal.dll 
22:27:25.562    1 nt!IofCallDriver -> \Device\Harddisk0\DR0[0xfffffa80049e1060]
22:27:25.570    3 CLASSPNP.SYS[fffff8800100143f] -> nt!IofCallDriver -> \Device\Ide\IAAStorageDevice-1[0xfffffa8004714050]
22:27:27.028    AVAST engine scan C:\Windows
22:27:28.847    AVAST engine scan C:\Windows\system32
22:32:26.375    AVAST engine scan C:\Windows\system32\drivers
22:32:55.484    AVAST engine scan C:\Users\Home
22:34:10.284    Disk 0 MBR has been saved successfully to "C:\Users\Home\Desktop\MBR.dat"
22:34:10.298    The log file has been saved successfully to "C:\Users\Home\Desktop\aswMBR.txt"
 
ESET RESULTS 
C:\Users\All Users\Zoomex\settings.ini    Win32/Adware.MultiPlug.F application    
C:\Program Files (x86)\Dell DataSafe Local Backup\hstart.exe    a variant of Win32/HiddenStart.A application    cleaned by deleting - quarantined
C:\Program Files (x86)\Dell DataSafe Local Backup\Components\DSUpdate\hstart.exe    a variant of Win32/HiddenStart.A application    cleaned by deleting - quarantined
C:\Program Files (x86)\FrostWire 5\frostwire-installer.exe    multiple threats    cleaned by deleting - quarantined
C:\Program Files (x86)\ZoomEx\sprotector.dll    a variant of Win32/SProtector.A application    cleaned by deleting (after the next restart) - quarantined
C:\ProgramData\Zoomex\settings.ini    Win32/Adware.MultiPlug.F application    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\02.03.2013_22.09.08\mbr0000\tdlfs0000\tsk0001.dta    Win64/Olmarik.AM trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\02.03.2013_22.09.08\mbr0000\tdlfs0000\tsk0002.dta    Win32/Olmarik.AWO trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\02.03.2013_22.09.08\mbr0000\tdlfs0000\tsk0003.dta    Win64/Olmarik.AN trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\02.03.2013_22.09.08\mbr0000\tdlfs0000\tsk0007.dta    Win32/Olmarik.AFK trojan    cleaned by deleting - quarantined
C:\TDSSKiller_Quarantine\02.03.2013_22.09.08\mbr0000\tdlfs0000\tsk0008.dta    Win64/Olmarik.AK trojan    cleaned by deleting - quarantined
C:\Users\Home\AppData\Roaming\FrostWire\.AppSpecialShare\frostwire-5.3.7.windows.exe    multiple threats    cleaned by deleting - quarantined
C:\Users\Home\Downloads\doubleTwistSetup.exe    Win32/OpenCandy application    cleaned by deleting - quarantined
C:\Users\Home\Downloads\GraboidVideoSetup-2.06-Complete(2).exe    Win32/Graboid application    cleaned by deleting - quarantined
C:\Users\Home\Downloads\GraboidVideoSetup-2.06-Complete.exe    Win32/Graboid application    cleaned by deleting - quarantined
C:\Users\Home\Downloads\The_Narrative_-_B-Sides_and_Seasides_(2012)_downloader_128 (1).exe    a variant of Win32/YourFileDownloader application    cleaned by deleting - quarantined
C:\Users\Home\Downloads\The_Narrative_-_B-Sides_and_Seasides_(2012)_downloader_128.exe    a variant of Win32/YourFileDownloader application    cleaned by deleting - quarantined
 


#4 narenxp

narenxp

  • BC Advisor
  • 16,371 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:India
  • Local time:11:33 PM

Posted 03 March 2013 - 12:32 AM

Please run TDSSkiller again and post the last few lines of log alone

 

Malwarebytes

--------------------

Please download Malwarebytes Anti-Malware and save it to your desktop.  If you already have it installed launch the program and update the database.

  • Important!! When you save the mbam-setup file, rename it to something random (such as 123abc.exe) before beginning the download.  You can also right click on the link and select Save Link As

Malwarebytes may "make changes to your registry" as part of its disinfection routine. If using other security programs that detect registry changes (ie Spybot's Teatimer), they may interfere or alert you. Temporarily disable such programs or permit them to allow the changes.

  • Make sure you are connected to the Internet and double-click on the renamed file to install the application.
    For instructions with screenshots, please refer to this Guide.
  • When the installation begins, follow the prompts and do not make any changes to default settings except to uncheck any offer for a free Pro trial version
  • Malwarebytes will automatically start and you will be asked to update the program before performing a scan.
  • If an update is found, the program will automatically update itself. Press the OK button and continue.
  • If you encounter any problems while downloading the definition updates, manually download them from here and just double-click on mbam-rules.exe to install.
  • Under the Scanner tab, make sure the "Perform Quick Scan" option is selected.
  • Click on the Scan button.
  • When finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".
  • Click OK to close the message box, then click the Show Results button to see a list of any malware that was found.
  • Make sure that everything is checked and then click Remove Selected.
  • When removal is completed, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply. Be sure to post the complete log to include the top portion which shows the database version and your operating system.
  • Exit Malwarebytes when done.

Note: If Malwarebytes encounters a file that is difficult to remove, you will be asked to reboot your computer so it can proceed with the disinfection process. If asked to restart the computer, please do so immediately. Failure to reboot normally will prevent Malwarebytes from removing all the malware.


===================================================


Farbar's MiniToolBox

--------------------

  • Please download MiniToolBox, save it to your desktop
  • Please close any Firefox browsers you may have open
  • Double click the icon to launch the program
  • Make sure the following options are checked:

    • Flush DNS
    • Report IE Proxy Settings
    • Reset IE Proxy Settings
    • Report FF Proxy Settings
    • Reset FF Proxy Settings
    • List content of Hosts
    • List IP configuration
    • List Winsock Entries
    • List last 10 Event Viewer log
    • List Installed Programs
    • List Devices
    • List Users, Partitions and Memory size.
  • Click Go and once the scan is completed a Result.txt Notepad document will open on your desktop
  • Please copy and paste the contents in your reply


===================================================


Farbar's Service Scanner

--------------------

Please download Farbar Service Scanner, save it to your desktop, and run it.

  • Make sure the following options are checked:

    • Internet Services
    • Windows Firewall
    • System Restore
    • Security Center/Action Center
    • Windows Update
    • Windows Defender
    • Other Services
  • Press "Scan".
  • It will create a log (FSS.txt) in the same directory the tool is run.
  • Please copy and paste the log to your reply.


===================================================


AdwCleaner by Xplode - Search for Adware

-------------------

  • Please download AdwCleaner by Xplode onto your desktop.
  • Double click on AdwCleaner.exe, select OK, then Run
  • Click on DELETE
  • A logfile will automatically open after the scan has finished
  • Copy and paste the contents in your reply
  • You can find the logfile at C:\AdwCleaner[R1].txt as well


===================================================


Junkware Removal Tooll by thisisu

-------------------

  • Please download Junkware Removal Tool and save it to your desktop.
  • Disable your AntiVirus and AntiSpyware applications, usually via a right click on the System Tray icon. They may otherwise interfere with our tools. (Click on this link to see a list of programs that should be disabled. The list is not all inclusive.)
  • Right-mouse click JRT.exe and select Run as administrator (Windows XP double click the icon)
  • Please allow the program time to run
  • Once completed a Notepad document will open on your desktop
  • Copy and paste the contents in your reply


===================================================


Rkill

-------------------

Please download Rkill by Grinler from one of the 4 links below (if one of them does not work try another...) and save it to your desktop:


  • In order for Rkill to run properly you must disable your anti-malware software.  Please refer to this page if you are not sure how.
  • Double-click on Rkill. (If you are using Windows Vista, please right-click on it and select Run As Administrator)
    • Note:  You may have to run Rkill a few times before it is successful.  You may also have to download Rkill from a different link which will save it as a different file name.
  • A black screen will appear and then disappear. Please do not worry, that is normal. This means that the tool has been successfully executed.
  • An Rkill.log will appear.  Please copy and paste the contents in your reply (file also located at c:\rkill.log)
  • Do not reboot your computer after running Rkill as the malware programs will start again.  If your computer reboots, run Rkill again before continuing on to the next step.
  • If nothing happens or if the tool does not run, please let me know in your next reply.


===================================================


Autoruns

--------------------

  • Please download AutoRuns and save it to your desktop
  • Double click the AutoRuns.zip folder
  • Double click autoruns.exe (not autorunsc.exe), select Run, then Run again and allow the information to populate
  • Select File, Save, Desktop (in the left hand pane), then Save filename as Autoruns.txt and change Save as type to  Text(*.txt).
  • Double click on the text file,copy and paste the contents in your reply


===================================================


Things I would like to see in your next reply. Please be sure to copy and paste the information rather than send an attachment. :thumbsup2:

  • Malwarebytes log
  • MiniToolBox log
  • Farbar's Service Scanner log
  • AdwCleaner log
  • Junkware Removal Tool log
  • Rkill log
  • Autoruns log

 






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users