Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infection or Hardware Issue? Windows 7 Not Genuine message Build 7601, new today


  • Please log in to reply
3 replies to this topic

#1 jimenej

jimenej

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:12:41 PM

Posted 16 April 2016 - 02:58 AM

Starting today, seemingly out of nowhere, my custom Windows 7 desktop PC started giving me a message along the lines of "you may be a victim of software counterfeiting," asking me to validate windows, then asking me to reinstall windows. I got this PC less than 1 year ago with a brand new Windows 7 key. Up until this time, I haven't had many major issues crop up, but some minor things have had me suspicious, and even more so now.

 

I ran Microsoft Security Essentials (detected/removed nothing) and Malwarebytes (removed/detected some PUPs but no frank malware). I attempted to backup my computer today using Windows backup, but it was unable to complete fully due to some corruption (I believe is what it said) in the C drive. 

 

Since this PC is less than one year old, I am hoping it's not hardware failure. If there's anything that could be done before I have to throw in the towel and get a new hard drive, then I need some help! 

 

Whatever logs and specs you need, please guide me and I'll be happy to provide. 

Thanks.



BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,197 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:12:41 PM

Posted 16 April 2016 - 05:49 AM

Rerun MBAM after allowing it to update. Post the results of the scan using the instructions below.

Once adware and malware are eliminated as the cause of the problem then instructions will be given for trouble shooting and repairing

the files and /or hardware.

 

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 


  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
  • Click the Remove Selected button.
  • MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR  REVIEW.

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 jimenej

jimenej
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:12:41 PM

Posted 16 April 2016 - 02:47 PM

Alright, when I ran MBAM yesterday, I believe it had already been fully updated, so the only difference then was that Scan for rootkits was not checked at that time. When I ran it today with that checked, it didn't appear to have made a difference. I will post today's log below first, then yesterdays log for review:
 
Here is today's:

 
Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 4/16/2016
Scan Time: 3:09 PM
Logfile: MBAM 2.txt
Administrator: Yes
 
Version: 2.2.1.1043
Malware Database: v2016.04.16.04
Rootkit Database: v2016.04.09.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Jon
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 332742
Time Elapsed: 6 min, 58 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 0
(No malicious items detected)
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
And here is yesterday's: 
 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 4/16/2016
Scan Time: 3:19 AM
Logfile: MBAM 0.txt
Administrator: Yes
 
Version: 2.2.1.1043
Malware Database: v2016.04.16.01
Rootkit Database: v2016.04.09.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Jon
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 334263
Time Elapsed: 5 min, 16 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 19
PUP.Optional.OpenCandy, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\INTERFACE\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{47A1DF02-BCE4-40C3-AE47-E3EA09A65E4A}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\TYPELIB\{1112F282-7099-4624-A439-DB29D6551552}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\INTERFACE\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\WOW6432NODE\INTERFACE\{FA7B2795-C0C8-4A58-8672-3F8D80CC0270}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{1112F282-7099-4624-A439-DB29D6551552}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\WOW6432NODE\TYPELIB\{1112F282-7099-4624-A439-DB29D6551552}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\OCComSDK.ComSDK.1, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\OCComSDK.ComSDK, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\WOW6432NODE\CLASSES\OCComSDK.ComSDK, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\WOW6432NODE\OCComSDK.ComSDK, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\WOW6432NODE\CLASSES\OCComSDK.ComSDK.1, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\WOW6432NODE\OCComSDK.ComSDK.1, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
PUP.Optional.OpenCandy, HKLM\SOFTWARE\CLASSES\WOW6432NODE\CLSID\{B9D64D3B-BE75-4FA2-B94A-C4AE772A0146}, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 1
PUP.Optional.OpenCandy, C:\Users\Jon\AppData\Local\Temp\HYDCA9A.tmp.1438456909\HTA\3rdparty\OCComSDK.dll, Quarantined, [dba6a40ba7f24beb7e7cc760c14453ad], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)


Here is the log from Adwcleaner:

 

# AdwCleaner v5.111 - Logfile created 16/04/2016 at 15:24:07
# Updated 14/04/2016 by Xplode
# Database : 2016-04-15.1 [Server]
# Operating system : Windows 7 Home Premium Service Pack 1 (X64)
# Username : Jon - JON-PC
# Running from : D:\Downloads\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Folders ] *****
 
 
***** [ Files ] *****
 
 
***** [ DLLs ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Scheduled tasks ] *****
 
 
***** [ Registry ] *****
 
 
***** [ Web browsers ] *****
 
 
*************************
 
:: "Tracing" keys deleted
:: Winsock settings cleared
 
*************************
 
C:\AdwCleaner\AdwCleaner[C1].txt - [688 bytes] - [16/04/2016 15:24:07]
C:\AdwCleaner\AdwCleaner[S1].txt - [749 bytes] - [16/04/2016 15:22:54]
 
########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [832 bytes] ##########
 
 

And, here is the JRT log from today:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.4 (03.14.2016)
Operating System: Windows 7 Home Premium x64 
Ran by Jon (Administrator) on Sat 04/16/2016 at 15:32:49.60
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
File System: 32 
 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1V06315L (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DU1PCRR (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7DV4G00R (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8YXOZ6Y7 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DQAK1R9E (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GXYSQH9U (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NWA4UZCI (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PKJL1848 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PROG3NRV (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QXIJOMZG (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SA9ZKP7N (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Jon\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WKFT8D5M (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1V06315L (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DU1PCRR (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7DV4G00R (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8YXOZ6Y7 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\DQAK1R9E (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GXYSQH9U (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NWA4UZCI (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PKJL1848 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PROG3NRV (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QXIJOMZG (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SA9ZKP7N (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WKFT8D5M (Temporary Internet Files Folder) 
 
 
 
Registry: 0 
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sat 04/16/2016 at 15:33:41.61
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Edited by jimenej, 16 April 2016 - 02:47 PM.


#4 buddy215

buddy215

  • Moderator
  • 13,197 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:12:41 PM

Posted 16 April 2016 - 03:34 PM

Use the instructions in this post Windows Repair All-in-one instructions Be sure to run Option #3.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users