Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

System too slow


  • Please log in to reply
3 replies to this topic

#1 flash110

flash110

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:07 AM

Posted 16 February 2014 - 04:34 PM

Hi!, my Windows 7 system is running too slow, taskmanager shows the cpu usage close to 100% almost all the time even with all applications closed and in the processes list there´s no process using cpu. I thought it might be Windows update installing automatically something but the problem continues, I run Adware and it didn´t detect anything. What do I do?? Thanks !!



BC AdBot (Login to Remove)

 


#2 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,126 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:07 AM

Posted 16 February 2014 - 04:55 PM


Please download and use the following tools (in the order listed) which will search for and remove many potentially unwanted programs (PUPs), adware, toolbars, browser hijackers, extensions, add-ons and other junkware as well as related registry entries (values, keys) and remnants.

RKill created by Grinler (aka Lawrence Abrams), the site owner of BleepingComputer.
AdwCleaner created by Xplode.
Junkware Removal Tool created by thisisu.

1. Double-click on RKill to launch the tool. A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully. A log file will be created and saved to the root directory, C:\RKill.log. Copy and paste the contents of RKill.log in your next reply.

Important: Do not reboot your computer until you complete the next step.

2. Double-click on AdwCleaner.exe to run the tool.
Vista/Windows 7/8 users right-click and select Run As Administrator.
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • After reviewing the log, click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.
-- Note: The contents of the AdwCleaner log file may be confusing. Unless you see a program name that you recognize and know should not be removed, don't worry about it. If you see an entry you want to keep, return to AdwCleaner before cleaning...all detected items will be listed (and checked) in each tab. Click on each one and uncheck any items you want to keep (except you cannot uncheck Chrome and Firefox preferences lines).


Close all open programs and shut down any protection/security software to avoid potential conflicts.

3. Double-click on JRT.exe to run the tool.
Vista/Windows 7/8 users right-click and select Run As Administrator.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log file named JRT.txt will automatically open and be saved to your Desktop.
  • Copy and paste the contents of JRT.txt in your next reply.
.
4. As a final step, download and scan with Malwarebytes Anti-Malware.
  • When done, a log report will open in Notepad.
  • The log is automatically saved and can be viewed by clicking the Logs tab.
  • Copy and paste the contents of that report in your next reply.

.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

#3 flash110

flash110
  • Topic Starter

  • Members
  • 20 posts
  • OFFLINE
  •  
  • Local time:06:07 AM

Posted 16 February 2014 - 08:35 PM

Rkill 2.6.5 by Lawrence Abrams (Grinler)

http://www.bleepingcomputer.com/

Copyright 2008-2014 BleepingComputer.com

More Information about Rkill can be found at this link:

http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 02/16/2014 07:36:29 PM in x86 mode.

Windows Version: Windows 7 Starter Service Pack 1

Checking for Windows services to stop:

* No malware services found to stop.

Checking for processes to terminate:

* No malware processes found to kill.

Checking Registry for malware related settings:

* No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

* Windows Defender Disabled

[HKLM\SOFTWARE\Microsoft\Windows Defender]

"DisableAntiSpyware" = dword:00000001

Checking Windows Service Integrity:

* Windows Defender (WinDefend) is not Running.

Startup Type set to: Manual

* SensrSvc [Missing Service]

* WSearch [Missing Service]

Searching for Missing Digital Signatures:

* No issues found.

Checking HOSTS File:

* Cannot edit the HOSTS file.

* Permissions could not be fixed. Use Hosts-perm.bat to fix permissions: http://www.bleepingcomputer.com/download/hosts-permbat/

* HOSTS file entries found:

127.0.0.1 localhost

127.0.0.1 3dns.adobe.com 3dns-1.adobe.com 3dns-2.adobe.com 3dns-3.adobe.com 3dns-4.adobe.com activate.adobe.com activate-sea.adobe.com activate-sjc0.adobe.com activate.wip.adobe.com

127.0.0.1 activate.wip1.adobe.com activate.wip2.adobe.com activate.wip3.adobe.com activate.wip4.adobe.com adobe-dns.adobe.com adobe-dns-1.adobe.com adobe-dns-2.adobe.com adobe-dns-3.adobe.com adobe-dns-4.adobe.com

127.0.0.1 adobeereg.com practivate.adobe practivate.adobe.com practivate.adobe.newoa practivate.adobe.ntp practivate.adobe.ipp ereg.adobe.com ereg.wip.adobe.com ereg.wip1.adobe.com

127.0.0.1 ereg.wip2.adobe.com ereg.wip3.adobe.com ereg.wip4.adobe.com hl2rcv.adobe.com wip.adobe.com wip1.adobe.com wip2.adobe.com wip3.adobe.com wip4.adobe.com

127.0.0.1 www.adobeereg.com wwis-dubc1-vip60.adobe.com www.wip.adobe.com www.wip1.adobe.com

127.0.0.1 www.wip2.adobe.com www.wip3.adobe.com www.wip4.adobe.com wwis-dubc1-vip60.adobe.com crl.verisign.net CRL.VERISIGN.NET ood.opsource.net

Program finished at: 02/16/2014 07:51:55 PM

Execution time: 0 hours(s), 15 minute(s), and 25 seconds(s)

 

# AdwCleaner v3.018 - Reporte Creado 16/02/2014 en 20:15:15

# Actualizado 28/01/2014 por Xplode

# Sistema Operativo : Windows 7 Starter Service Pack 1 (32 bits)

# Nombre de usuario : JoG - PC-PC

# Ejecutado desde : C:\Users\JoG\Desktop\antispyware\adwcleaner.exe

# Opción : Limpiar

***** [ Servicios ] *****

 

***** [ Archivos / Carpetas ] *****

 

***** [ Accesos directos ] *****

 

***** [ Registro ] *****

 

***** [ Navegadores ] *****

-\\ Internet Explorer v11.0.9600.16518

 

-\\ Google Chrome v32.0.1700.107

[ Archivo : C:\Users\pc\AppData\Local\Google\Chrome\User Data\Default\preferences ]

 

[ Archivo : C:\Users\JoG\AppData\Local\Google\Chrome\User Data\Default\preferences ]

 

*************************

AdwCleaner[R0].txt - [34074 octets] - [17/12/2013 12:23:48]

AdwCleaner[R1].txt - [2121 octets] - [17/12/2013 13:02:49]

AdwCleaner[R2].txt - [1672 octets] - [16/02/2014 18:19:39]

AdwCleaner[R3].txt - [1251 octets] - [16/02/2014 20:08:36]

AdwCleaner[S0].txt - [32339 octets] - [17/12/2013 12:25:45]

AdwCleaner[S1].txt - [2144 octets] - [17/12/2013 13:04:24]

AdwCleaner[S2].txt - [1624 octets] - [16/02/2014 18:39:21]

AdwCleaner[S3].txt - [1171 octets] - [16/02/2014 20:15:15]

########## EOF - C:\AdwCleaner\AdwCleaner[S3].txt - [1231 octets] ##########

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Junkware Removal Tool (JRT) by Thisisu

Version: 6.1.1 (02.04.2014:1)

OS: Windows 7 Starter x86

Ran by JoG on 16/02/2014 at 20:42:29,50

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

 

 

~~~ Services

 

 

~~~ Registry Values

Successfully deleted: [Registry Value] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\\apntbmon

Suspicious HKCU\..\Run entries found. Trojan:JS/Medfos.B?

Value Name Type Value Data

========================================================================================

TBHostSupport REG_SZ "C:\windows\system32\Rundll32.exe" "C:\Users\JoG\AppData\Local\TBHostSupport\TBHostSupport.dll",DLLRunTBHostSupportPlugin

 

 

 

~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{41564952-412D-5637-00A7-7A786E7484D7}

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{00EF7F9F-FEFA-D967-C5AD-E140905E2B35}

Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{00EF7F9F-FEFA-D967-C5AD-E140905E2B35}

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{00EF7F9F-FEFA-D967-C5AD-E140905E2B35}

 

 

~~~ Files

 

 

~~~ Folders

Successfully deleted: [Folder] "C:\ProgramData\apn"

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{0356401F-E00E-4E1A-8505-38BCBED9AFCD}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{71C705E6-EC06-441A-B35F-3E331B51E782}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{844C2DEB-C98C-428E-AF4A-A32F2D0F4FA8}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{A22F68BD-B3B7-4ADD-A2CA-6392F4D763AB}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{A37F4E09-1EF7-43CD-BD58-703E7FFE620A}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{A3C77E4A-3B57-4AF8-81FC-2D2261E31A6B}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{A59BF05B-D4B7-402B-9A98-F0BE717A337E}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{C8E4B1FE-4CD3-4A58-8E42-5E4B1F53728B}

Successfully deleted: [Empty Folder] C:\Users\JoG\appdata\local\{E31AD6F6-40C6-4F51-A938-137AA542B23C}

 

 

~~~ Chrome

Successfully deleted: [Folder] C:\Users\JoG\appdata\local\Google\Chrome\User Data\Default\Extensions\aaaaacalgebmfelllfiaoknifldpngjh

Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extensions\aaaaacalgebmfelllfiaoknifldpngjh

 

 

~~~ Event Viewer Logs were cleared

 

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Scan was completed on 16/02/2014 at 20:45:58,35

End of JRT log

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org

Versión de la Base de Datos: v2014.02.16.07

Windows 7 Service Pack 1 x86 NTFS
Internet Explorer 11.0.9600.16518
JoG :: PC-PC [administrador]

16/02/2014 21:46:37
mbam-log-2014-02-16 (21-46-37).txt

Tipos de Análisis: Análisis Rápido
Opciones de análisis activado: Memoria | Inicio | Registro | Sistema de archivos | Heurística/Extra | Heurística/Shuriken | PUP | PUM
Opciones de análisis desactivados: P2P
Objetos examinados: 279516
Tiempo transcurrido: 47 minuto(s), 2 segundo(s)

Procesos en Memoria Detectados: 0
(No se han detectado elementos maliciosos)

Módulos de Memoria Detectados: 0
(No se han detectado elementos maliciosos)

Claves del Registro Detectados: 0
(No se han detectado elementos maliciosos)

Valores del Registro Detectados: 1
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run|TBHostSupport (PUP.Optional.Conduit) -> datos: "C:\windows\system32\Rundll32.exe" "C:\Users\JoG\AppData\Local\TBHostSupport\TBHostSupport.dll",DLLRunTBHostSupportPlugin -> En cuarentena y eliminado con éxito.

Elementos de Datos del Registro Detectados: 0
(No se han detectado elementos maliciosos)

Carpetas Detectadas: 7
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly (PUP.Optional.DealPly.A) -> En cuarentena y eliminado con éxito.
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly\UpdateProc (PUP.Optional.DealPly.A) -> En cuarentena y eliminado con éxito.
C:\Users\JoG\AppData\Local\Temp\mt_ffx\Delta (PUP.Optional.Delta.A) -> En cuarentena y eliminado con éxito.
C:\Users\JoG\AppData\Local\Temp\mt_ffx\Delta\delta (PUP.Optional.Delta.A) -> En cuarentena y eliminado con éxito.
C:\Users\JoG\AppData\Local\Temp\mt_ffx\Delta\delta\1.8.21.5 (PUP.Optional.Delta.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619 (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619\xpi (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.

Archivos Detectados: 9
C:\Users\JoG\Desktop\rcpsetup_softonic_sd_global.exe (PUP.Optional.RegCleanerPro) -> En cuarentena y eliminado con éxito.
C:\Users\JoG\AppData\Local\Temp\747F38FB-BAB0-7891-9964-6EE4BCE342C3\Latest\CrxInstaller.dll (PUP.Optional.Babylon.A) -> En cuarentena y eliminado con éxito.
C:\Windows\System32\config\systemprofile\AppData\Roaming\DealPly\UpdateProc\config.dat (PUP.Optional.DealPly.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619\CT2851619.txt (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619\CT2851619.xpi (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619\initData.json (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619\manifest.json (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619\version.txt (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.
C:\Users\pc\AppData\Local\Temp\CT2851619\xpi\install.rdf (PUP.Optional.Conduit.A) -> En cuarentena y eliminado con éxito.

fin)



#4 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,126 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:07 AM

Posted 16 February 2014 - 08:44 PM

Try doing an online scan to see if it finds anything else that the other scans may have missed.

Please perform a scan with Eset Online Anti-virus Scanner.
If using Mozilla Firefox, you will be prompted to download and use the ESET Smart Installer. Just double-click on esetsmartinstaller_enu.exe to install.
Vista/Windows 7/8 users need to run Internet Explorer/Firefox as Administrator.
To do this, right-click on the IE icon in the Start Menu or Quick Launch Bar on the Taskbar and select Run As Administrator from the context menu.

  • Click the green esetOnline.png button.
  • Read the End User License Agreement and check the box:
  • Check esetAcceptTerms.png.
  • Click the esetStart.png button.
  • Accept any security warnings from your browser and allow the download/installation of any require files.
  • Under scan settings, check esetScanArchives.png and check Remove found threats
  • Click Advanced settings and select the following:
    • Scan potentially unwanted applications
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Click the Start button.
  • ESET will install itself, download virus signature database updates, and begin scanning your computer.
  • The scan can take some time to complete...close all programs and do NOT use the computer while the scan is running.
    If given the option (when threats are found), choose "Quarantine" instead of delete.
  • When the scan completes, push esetListThreats.png
  • Push esetExport.png, and save the file to your desktop as ESETScan.txt.
  • Push the esetBack.png button, then Finish.
  • Copy and paste the contents of ESETScan.txt in your next reply. If no threats are found, there is no option to create a log.

-- Note: If you recognize any of the detections as legitimate programs, it's possible they are "false positives" and you can ignore them or get a second opinion if you're not sure. Eset's detection rate is high and can include legitimate files which it considers suspicious, a Risk Tool, Hacking Tool, Potentially Unwanted Program, a possible threat or even Malware (virus/trojan) when that is not always the case. Be careful what you choose to remove. If in doubt, ask before taking action.


.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users