Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Audio ads playing in background


  • This topic is locked This topic is locked
7 replies to this topic

#1 bats1234

bats1234

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:47 AM

Posted 22 March 2014 - 08:57 PM

so ive had this problem for a few months now and at random times ads just start playing i dont even have anything open. ive tried many thing to fix it but nothing works they just keep on playing. also at random times it tells me somthing like plug n play services have terminated and must now restart and DCOM services have terminated and must now restart and its is annyoing please help me.

Edit: Moved topic from Windows 7 to the more appropriate forum.~ Animal

BC AdBot (Login to Remove)

 


#2 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:47 AM

Posted 23 March 2014 - 06:51 AM

Hi,
 
Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.
 
rKill.exe: http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/

  • Double-click on the Rkill desktop icon to run the tool.
  • If using Vista or Windows 7 right-click on it and choose Run As Administrator.
  • A black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • Do not reboot until instructed.
  • If the tool does not run from any of the links provided, please let me know.

After the tool has finished running, a text file named Rkill.txt should be located on the desktop. Please copy and paste the contents into your next reply.

 

xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#3 bats1234

bats1234
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:47 AM

Posted 24 March 2014 - 08:00 PM

Ok sorry for the late response I will do it and it may take a bit so sorry if I respond a bit late



#4 bats1234

bats1234
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:47 AM

Posted 24 March 2014 - 08:08 PM

Here is what it gave me in the rkill text file

 

 

 

Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 03/24/2014 08:07:32 PM in x86 mode.
Windows Version: Windows 7 Enterprise

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:
 



#5 bats1234

bats1234
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:47 AM

Posted 24 March 2014 - 08:10 PM

im sorry ignore the first one here is the one after it closed
 
 
 
Rkill 2.6.5 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2014 BleepingComputer.com
More Information about Rkill can be found at this link:
 http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 03/24/2014 08:08:51 PM in x86 mode.
Windows Version: Windows 7 Enterprise

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * Windows Defender Disabled

   [HKLM\SOFTWARE\Microsoft\Windows Defender]
   "DisableAntiSpyware" = dword:00000001

Checking Windows Service Integrity:

 * Windows Defender (WinDefend) is not Running.
   Startup Type set to: Manual

Searching for Missing Digital Signatures:

 * C:\Windows\System32\rpcss.dll : 376,320 : 07/13/2009 08:16 PM : cf049c46a222d2369b278007216bc645 [NoSig]
 +-> C:\Windows\winsxs\x86_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_6.1.7600.16385_none_69a1321f9f3393ad\rpcss.dll : 376,320 : 07/13/2009 08:16 PM : b82cd39e336973359d7c9bf911e8e84f [Pos Repl]

 * C:\Windows\System32\user32.dll : 811,520 : 04/07/2011 10:32 PM : 7bd7f45ff37fa0669cd32ca0ef46e22c [NoSig]
 +-> C:\Windows\winsxs\x86_microsoft-windows-user32_31bf3856ad364e35_6.1.7600.16385_none_cd0ec264ceb014a3\user32.dll : 811,520 : 07/13/2009 08:16 PM : 34b7e222e81fafa885f0c5f2cfa56861 [Pos Repl]

Checking HOSTS File:

 * HOSTS file entries found:

  127.0.0.1 localhost
  127.0.0.1 3dns.adobe.com 3dns-1.adobe.com 3dns-2.adobe.com 3dns-3.adobe.com 3dns-4.adobe.com activate.adobe.com activate-sea.adobe.com activate-sjc0.adobe.com activate.wip.adobe.com
  127.0.0.1 activate.wip1.adobe.com activate.wip2.adobe.com activate.wip3.adobe.com activate.wip4.adobe.com adobe-dns.adobe.com adobe-dns-1.adobe.com adobe-dns-2.adobe.com adobe-dns-3.adobe.com adobe-dns-4.adobe.com
  127.0.0.1 adobeereg.com practivate.adobe practivate.adobe.com practivate.adobe.newoa practivate.adobe.ntp practivate.adobe.ipp ereg.adobe.com ereg.wip.adobe.com ereg.wip1.adobe.com
  127.0.0.1 ereg.wip2.adobe.com ereg.wip3.adobe.com ereg.wip4.adobe.com hl2rcv.adobe.com wip.adobe.com wip1.adobe.com wip2.adobe.com wip3.adobe.com wip4.adobe.com
  127.0.0.1 www.adobeereg.com wwis-dubc1-vip60.adobe.com www.wip.adobe.com www.wip1.adobe.com
  127.0.0.1 www.wip2.adobe.com www.wip3.adobe.com www.wip4.adobe.com wwis-dubc1-vip60.adobe.com crl.verisign.net CRL.VERISIGN.NET ood.opsource.net
  127.0.0.1                activate.adobe.com
  127.0.0.1                practivate.adobe.com
  127.0.0.1                ereg.adobe.com
  127.0.0.1                activate.wip3.adobe.com
  127.0.0.1                wip3.adobe.com
  127.0.0.1                3dns-3.adobe.com
  127.0.0.1                3dns-2.adobe.com
  127.0.0.1                adobe-dns.adobe.com
  127.0.0.1                adobe-dns-2.adobe.com
  127.0.0.1                adobe-dns-3.adobe.com
  127.0.0.1                ereg.wip3.adobe.com
  127.0.0.1                activate-sea.adobe.com
  127.0.0.1                wwis-dubc1-vip60.adobe.com

  20 out of 28 HOSTS entries shown.
  Please review HOSTS file for further entries.

Program finished at: 03/24/2014 08:09:54 PM
Execution time: 0 hours(s), 1 minute(s), and 3 seconds(s)
 

Edited by bats1234, 24 March 2014 - 10:38 PM.


#6 xXToffeeXx

xXToffeeXx

    Bleepin' Polar Bear


  • Malware Response Instructor
  • 6,086 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:The Arctic Circle
  • Local time:10:47 AM

Posted 25 March 2014 - 12:30 PM

Hi,

 

You got hit with the latest version of Zekos. One of your system files (rpcss.dll) has been patched.

You'll need more advanced tools to replace that file.
 
Please follow the instructions in THIS GUIDE starting at Step 6. If you cannot complete a step, skip it and continue.

Once the proper logs are created, then make a NEW TOPIC and post it HERE. Please include a description of your computer issues, what you have done to resolve them, and a link to this topic.

If you can produce at least some of the logs, then please create the new topic and explain what happens when you try to create the log(s) that you couldn't get. If you cannot produce any of the logs, then still post the topic and explain that you followed the Prep. Guide, were unable to create the logs, and describe what happens when you try to create the logs.

It would be helpful if you post a note here once you have completed the steps in the guide and have started your topic in malware removal. Good luck and be patient.

If HelpBot replies to your topic, PLEASE follow Step One so it will report your topic to the team members.

 

xXToffeeXx~


~If I am helping you and you have not had a reply from me in two days, please send me a PM~

 

logo-25.pngID Ransomware - Identify What Ransomware Encrypted Your Files [Support Topic] - If we have helped you out and you want to support what we do, you can do so here

 

 ~Twitter~ | ~Malware Analyst at Emsisoft~


#7 bats1234

bats1234
  • Topic Starter

  • Members
  • 17 posts
  • OFFLINE
  •  
  • Local time:05:47 AM

Posted 25 March 2014 - 04:06 PM

Hello i have done what you told me and i have posted a new topic here is a link

http://www.bleepingcomputer.com/forums/t/528758/i-have-been-hit-with-zekoshelp/

Is it what i was suppost to do?



#8 quietman7

quietman7

    Bleepin' Janitor


  • Global Moderator
  • 51,955 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Virginia, USA
  • Local time:05:47 AM

Posted 25 March 2014 - 06:11 PM


Now that your log is posted, you should NOT make further changes to your computer (install/uninstall programs, use special fix tools, delete files, edit the registry, etc) unless advised by a Malware Response Team member...nor should you continue to ask for help elsewhere. Doing so can result in system changes which may not show in the log(s) you already posted. Further, any modifications you make on your own may cause confusion for the member assisting you and could complicate the malware removal process or make things worst which would extend the time it takes to clean your computer.

From this point on the Malware Response Team should be the only members that you take advice from, until they have verified your log as clean.

Please be patient. It may take several days to get a response because the Malware Response Team members are very busy working logs posted before yours. They are volunteers who will help you out as soon as possible. Once you have posted your log and are waiting, please DO NOT "bump" your post or make another reply until it has been responded to by a member of the Malware Response Team. Generally the staff checks the forum for postings that have 0 replies as this makes it easier for them to identify those who have not been helped. If you post another response there will be 1 reply. A team member, looking for a new log to work may assume another Malware Response Team member is already assisting you and not open the thread to respond.

If HelpBot replies to your topic, please follow Step One and CLICK the link so it will report your topic to the team members.

To avoid confusion, I am closing this topic.

Good luck with your log.
.
.
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users