Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

"Requested resource in use" error. Possible SmartService trojan??


  • Please log in to reply
9 replies to this topic

#1 Mrsgreene9116

Mrsgreene9116

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:02:31 AM

Posted 06 December 2017 - 01:15 AM

I have an Asus R554LA laptop running Windows 10 that I was told when I bought secondhand that it has malware on it.  When I try to download any antivirus, I get the requested resource is in use error and I have tried the self help instructional regarding this virus.  However, only a couple of the steps work.  My system restore has no restore points and I also cannot reset to factory defaults using settings or f9.  I have also downloaded the ASUS recovery software from ASUS and it gives me an error that says recovery partition not found, operation aborted.  Although the recovery partition is there, i think.  Please help!!  Thank you.



BC AdBot (Login to Remove)

 


m

#2 buddy215

buddy215

  • BC Advisor
  • 12,267 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:08:31 PM

Posted 06 December 2017 - 06:15 PM

Welcome to BC...

 

See if you can do this:

Follow the instructions in the thread below. Make sure to download the MBAR linked in it. Let me know if you're not able to launch it and run a scan.
https://forums.malwarebytes.com/topic/198907-requested-resource-is-in-use-error-unable-to-start-malwarebytes/

 

If you are unable to run that scan then it is best you start a new topic in the malware removal forum by following the instructions below.

 

Please follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.

  • If you cannot complete a step, then skip it and continue with the next.
  • In Step 6 there are instructions for downloading and running FRST which will create two logs.

When you have done that, post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.

Start a new topic, give it a relevant title and post your log(s) along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. If you cannot produce any of the required logs...start the new topic anyway. Explain that you followed the Prep. Guide, were unable to create the logs, and describe what happened when you tried to create them. A member of the Malware Removal Team will walk you through, step by step, on how to clean your computer.

After doing this, please reply back in this thread with a link to the new topic so we can close this one.

 

DO NOT bump your new topic. Wait for a response from one of the Team Members.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#3 Mrsgreene9116

Mrsgreene9116
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:02:31 AM

Posted 07 December 2017 - 04:49 AM

I was able to run the MBAR zipped download scan and these are the logs.  Now, it says it successfully cleaned it.  Do I need to take any further steps?  Here is the mbar log:

 

Malwarebytes Anti-Rootkit BETA 1.10.3.1001
www.malwarebytes.org
 
Database version:
  main:    v2017.12.07.03
  rootkit: v2017.10.14.01
 
Windows 10 x64 NTFS
Internet Explorer 11.726.15063.0
PC :: NOTYOURS [administrator]
 
12/7/2017 1:58:20 AM
mbar-log-2017-12-07 (01-58-20).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: 
Objects scanned: 193271
Time elapsed: 34 minute(s), 25 second(s)
 
Memory Processes Detected: 6
c:\windows\system32\mszquoa.exe (Adware.Yelloader) -> 4504 -> Delete on reboot. [427d9195f6b4fc3ac8683c6d06fb6e92]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe (Trojan.Agent) -> 1424 -> Delete on reboot. [9a2556d099112511dd8edee8ae53d22e]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe (Adware.Yelloader) -> 9404 -> Delete on reboot. [803ffa2c466482b482c8ba7a0ef3d22e]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe (Adware.Yelloader) -> 5912 -> Delete on reboot. [803ffa2c466482b482c8ba7a0ef3d22e]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe (Adware.Yelloader) -> 4276 -> Delete on reboot. [803ffa2c466482b482c8ba7a0ef3d22e]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe (Adware.Yelloader) -> 428 -> Delete on reboot. [803ffa2c466482b482c8ba7a0ef3d22e]
 
Memory Modules Detected: 9
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\pepflashplayer.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 1
HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|svcvmx (Trojan.Agent) -> Data: "C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe" -starup -> Delete on reboot. [9a2556d099112511dd8edee8ae53d22e]
 
Registry Data Items Detected: 1
HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\PCW|Start (Hijack.DisabledPCW) -> Bad: (4) Good: (0) -> Replace on reboot. [b8075fc7eebc5ed8275a977304fd3cc4]
 
Folders Detected: 7
C:\Users\codyz\AppData\Local\ntuserlitelist (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\locales (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\PC\AppData\Local\ntuserlitelist (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\regtool (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\locales (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
 
Files Detected: 44
C:\WINDOWS\SYSTEM32\drivers\ndilgtad.sys (Rootkit.Agent.PUA) -> Delete on reboot. [2fedd7895becb52eec2b4a42b2641998]
C:\WINDOWS\SYSTEM32\drivers\msidntfs.sys (Rootkit.Agent.PUA) -> Delete on reboot. [2e5a88d8f70f711724c62e2d3af6aba1]
c:\windows\system32\mszquoa.exe (Adware.Yelloader) -> Delete on reboot. [427d9195f6b4fc3ac8683c6d06fb6e92]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe (Trojan.Agent) -> Delete on reboot. [9a2556d099112511dd8edee8ae53d22e]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe (Adware.Yelloader) -> Delete on reboot. [803ffa2c466482b482c8ba7a0ef3d22e]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe (Adware.Yelloader) -> Delete on reboot. [5669fc2ad7d382b474d67aba99684fb1]
C:\Users\PC\AppData\Local\ntuserlitelist\regtool\regtool.exe (Trojan.Agent) -> Delete on reboot. [8b3452d456543ff7a044d1c332cff010]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef.pak (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef_100_percent.pak (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef_200_percent.pak (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef_extensions.pak (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\d3dcompiler_47.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\debug.log (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\icudtl.dat (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\libcef.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\libEGL.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\libGLESv2.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\natives_blob.bin (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\pepflashplayer.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\snapshot_blob.bin (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\widevinecdm.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\widevinecdmadapter.dll (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\locales\en-US.pak (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\locales\zh-CN.pak (Trojan.Clicker) -> Delete on reboot. [259a1e08327876c0574644f5ac554ab6]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef.pak (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef_100_percent.pak (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef_200_percent.pak (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef_extensions.pak (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\d3dcompiler_47.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\debug.log (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\icudtl.dat (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libEGL.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libGLESv2.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\natives_blob.bin (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\pepflashplayer.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\snapshot_blob.bin (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\uninstall (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\widevinecdm.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\widevinecdmadapter.dll (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\locales\en-US.pak (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\locales\zh-CN.pak (Trojan.Clicker) -> Delete on reboot. [249bd254b7f38aac58458cad49b806fa]
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)
 
 
 
and here is the system log:
 
---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.10.3.1001
 
© Malwarebytes Corporation 2011-2012
 
OS version: 10.0.15063 Windows 10 x64
 
Account is Administrative
 
Internet Explorer version: 11.726.15063.0
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 1.696000 GHz
Memory total: 6347169792, free: 3823501312
 
Downloaded database version: v2017.12.07.03
Downloaded database version: v2017.11.28.01
=======================================
Driver version: 4.3.0.15
------------ Kernel report ------------
     12/07/2017 01:58:11
------------ Loaded modules -----------
\SystemRoot\system32\ntoskrnl.exe
\SystemRoot\system32\hal.dll
\SystemRoot\system32\kd.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\System32\drivers\msrpc.sys
\SystemRoot\System32\drivers\ksecdd.sys
\SystemRoot\System32\drivers\werkernel.sys
\SystemRoot\System32\drivers\CLFS.SYS
\SystemRoot\System32\drivers\tm.sys
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\BOOTVID.dll
\SystemRoot\System32\drivers\FLTMGR.SYS
\SystemRoot\System32\drivers\clipsp.sys
\SystemRoot\System32\drivers\cmimcext.sys
\SystemRoot\System32\drivers\ntosext.sys
\SystemRoot\system32\CI.dll
\SystemRoot\System32\drivers\cng.sys
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\SleepStudyHelper.sys
\SystemRoot\System32\Drivers\acpiex.sys
\SystemRoot\System32\Drivers\WppRecorder.sys
\SystemRoot\System32\drivers\ACPI.sys
\SystemRoot\System32\drivers\WMILIB.SYS
\SystemRoot\System32\drivers\intelpep.sys
\SystemRoot\system32\drivers\WindowsTrustedRT.sys
\SystemRoot\System32\drivers\WindowsTrustedRTProxy.sys
\SystemRoot\System32\drivers\ndilgtad.sys
\SystemRoot\System32\drivers\NETIO.SYS
\SystemRoot\System32\drivers\NDIS.SYS
\SystemRoot\System32\drivers\TDI.SYS
\SystemRoot\System32\drivers\msisadrv.sys
\SystemRoot\System32\drivers\pci.sys
\SystemRoot\System32\drivers\vdrvroot.sys
\SystemRoot\system32\drivers\pdc.sys
\SystemRoot\system32\drivers\CEA.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\System32\drivers\spaceport.sys
\SystemRoot\System32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\System32\drivers\storahci.sys
\SystemRoot\System32\drivers\storport.sys
\SystemRoot\System32\drivers\EhStorClass.sys
\SystemRoot\System32\drivers\fileinfo.sys
\SystemRoot\System32\Drivers\Wof.sys
\SystemRoot\system32\drivers\WdFilter.sys
\SystemRoot\System32\Drivers\NTFS.sys
\SystemRoot\System32\Drivers\Fs_Rec.sys
\SystemRoot\System32\Drivers\ksecpkg.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\System32\drivers\wfplwfs.sys
\SystemRoot\System32\DRIVERS\fvevol.sys
\SystemRoot\System32\drivers\volume.sys
\SystemRoot\System32\drivers\volsnap.sys
\SystemRoot\System32\drivers\rdyboost.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\system32\drivers\iorate.sys
\SystemRoot\System32\drivers\IntelPcc.sys
\SystemRoot\System32\drivers\disk.sys
\SystemRoot\System32\drivers\CLASSPNP.SYS
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\drivers\cdrom.sys
\SystemRoot\system32\drivers\filecrypt.sys
\SystemRoot\system32\drivers\tbs.sys
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\BasicDisplay.sys
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\vmbkmclr.sys
\SystemRoot\System32\drivers\BasicRender.sys
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\drivers\vwififlt.sys
\SystemRoot\System32\drivers\pacer.sys
\SystemRoot\system32\drivers\netbios.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\??\C:\WINDOWS\System32\drivers\zamguard64.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\System32\drivers\npsvctrig.sys
\SystemRoot\System32\drivers\mssmbios.sys
\SystemRoot\System32\drivers\gpuenergydrv.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\ahcache.sys
\SystemRoot\System32\drivers\pneteth.sys
\SystemRoot\System32\DriverStore\FileRepository\compositebus.inf_amd64_de4c68ea4fb1be53\CompositeBus.sys
\SystemRoot\System32\drivers\kdnic.sys
\SystemRoot\System32\drivers\umbus.sys
\SystemRoot\System32\drivers\CAD.sys
\SystemRoot\system32\DRIVERS\igdkmd64.sys
\SystemRoot\System32\drivers\HDAudBus.sys
\SystemRoot\System32\drivers\portcls.sys
\SystemRoot\System32\drivers\drmk.sys
\SystemRoot\System32\drivers\ks.sys
\SystemRoot\System32\drivers\dptf_cpu.sys
\SystemRoot\System32\drivers\USBXHCI.SYS
\SystemRoot\system32\drivers\ucx01000.sys
\SystemRoot\System32\drivers\TeeDriverW8x64.sys
\SystemRoot\System32\drivers\rt640x64.sys
\SystemRoot\System32\drivers\athw8x.sys
\SystemRoot\System32\drivers\vwifibus.sys
\SystemRoot\System32\drivers\i8042prt.sys
\SystemRoot\System32\drivers\mouclass.sys
\SystemRoot\System32\drivers\kbdclass.sys
\SystemRoot\System32\drivers\iaLPSSi_I2C.sys
\SystemRoot\system32\drivers\SpbCx.sys
\SystemRoot\System32\drivers\CmBatt.sys
\SystemRoot\System32\drivers\BATTC.SYS
\SystemRoot\System32\drivers\intelppm.sys
\SystemRoot\System32\drivers\acpipagr.sys
\SystemRoot\System32\drivers\wmiacpi.sys
\SystemRoot\System32\drivers\AsRadioControl.sys
\SystemRoot\System32\drivers\HIDCLASS.SYS
\SystemRoot\System32\drivers\HIDPARSE.SYS
\SystemRoot\System32\drivers\msgpiowin32.sys
\SystemRoot\System32\drivers\UEFI.sys
\SystemRoot\System32\drivers\NdisVirtualBus.sys
\SystemRoot\System32\drivers\swenum.sys
\SystemRoot\System32\drivers\rdpbus.sys
\SystemRoot\system32\drivers\ksthunk.sys
\SystemRoot\system32\drivers\RTKVHD64.sys
\SystemRoot\system32\DRIVERS\kxspb.sys
\SystemRoot\System32\drivers\UsbHub3.sys
\SystemRoot\System32\drivers\USBD.SYS
\SystemRoot\System32\drivers\usbccgp.sys
\SystemRoot\system32\DRIVERS\btfilter.sys
\SystemRoot\System32\drivers\BTHUSB.sys
\SystemRoot\System32\drivers\bthport.sys
\SystemRoot\System32\Drivers\fastfat.SYS
\SystemRoot\System32\drivers\hidusb.sys
\SystemRoot\system32\Drivers\RtsUer.sys
\SystemRoot\System32\Drivers\usbvideo.sys
\SystemRoot\System32\Drivers\dump_diskdump.sys
\SystemRoot\System32\Drivers\dump_storahci.sys
\SystemRoot\System32\Drivers\dump_dumpfve.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\win32kfull.sys
\SystemRoot\System32\win32kbase.sys
\SystemRoot\System32\drivers\dxgmms2.sys
\SystemRoot\System32\drivers\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\system32\drivers\WudfPf.sys
\SystemRoot\system32\DRIVERS\esif_lf.sys
\SystemRoot\System32\drivers\WUDFRd.sys
\SystemRoot\system32\drivers\luafv.sys
\SystemRoot\system32\drivers\wcifs.sys
\SystemRoot\system32\drivers\storqosflt.sys
\SystemRoot\System32\drivers\registry.sys
\SystemRoot\system32\drivers\mmcss.sys
\SystemRoot\system32\drivers\lltdio.sys
\SystemRoot\system32\drivers\mslldp.sys
\SystemRoot\system32\drivers\rspndr.sys
\SystemRoot\System32\DRIVERS\wanarp.sys
\SystemRoot\system32\DRIVERS\nwifi.sys
\SystemRoot\system32\drivers\ndisuio.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\system32\drivers\msidntfs.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\drivers\Ndu.sys
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\drivers\tcpipreg.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\drivers\vwifimp.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\System32\drivers\condrv.sys
\SystemRoot\System32\drivers\rdpvideominiport.sys
\SystemRoot\System32\cdd.dll
\SystemRoot\System32\drivers\mouhid.sys
\??\C:\WINDOWS\system32\drivers\2424C798.sys
----------- End -----------
Done!
 
Scan started
Database versions:
  main:    v2017.12.07.03
  rootkit: v2017.10.14.01
 
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffd18eef0be060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xffffd18eeeea39f0, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffd18eef0be060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
DevicePointer: 0xffffd18eecdce040, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xffffd18eecdcee40, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xffffd18eecdcb060, DeviceName: \Device\0000003b\, DriverName: \Driver\storahci\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
File C:\WINDOWS\SYSTEM32\drivers\ndilgtad.sys will be destroyed
Infected: C:\WINDOWS\SYSTEM32\drivers\ndilgtad.sys --> [Rootkit.Agent.PUA]
File C:\WINDOWS\SYSTEM32\drivers\msidntfs.sys will be destroyed
Infected: C:\WINDOWS\SYSTEM32\drivers\msidntfs.sys --> [Rootkit.Agent.PUA]
Done!
Drive 0
This is a System drive
Scanning MBR on drive 0...
Inspecting partition table:
This drive is a GPT Drive.
MBR Signature: 55AA
Disk Signature: D60A0684
 
GPT Protective MBR Partition information:
 
    Partition 0 type is EFI-GPT (0xee)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 1  Numsec = 4294967295
 
    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
GPT Partition information:
 
    GPT Header Signature 4546492050415254
    GPT Header Revision 65536 Size 92 CRC 1021068967
    GPT Header CurrentLba = 1 BackupLba 976773167
    GPT Header FirstUsableLba 34  LastUsableLba 976773134
    GPT Header Guid 4e9b347d-576-4a4d-884-757744101256
    GPT Header Contains 128 partition entries starting at LBA 2
    GPT Header Partition entry size = 128
 
    Backup GPT header Signature 4546492050415254
    Backup GPT header Revision 65536 Size 92 CRC 1021068967
    Backup GPT header CurrentLba = 976773167 BackupLba 1
    Backup GPT header FirstUsableLba 34  LastUsableLba 976773134
    Backup GPT header Guid 4e9b347d-576-4a4d-884-757744101256
    Backup GPT header Contains 128 partition entries starting at LBA 976773135
    Backup GPT header Partition entry size = 128
 
    Partition 0 Type c12a7328-f81f-11d2-ba4b-0a0c93ec93b
    Partition ID c786ee91-59ec-450e-9567-731af4551d73
    FirstLBA 2048  Last LBA 534527
    Attributes 0
    Partition Name                 EFI system partition
 
    GPT Partition 0 is bootable
    Partition 1 Type e3c9e316-b5c-4db8-817d-f92df0215ae
    Partition ID 4dd5c299-ff2b-4dd4-ba67-89f0624cf228
    FirstLBA 534528  Last LBA 567295
    Attributes 0
    Partition Name         Microsoft reserved partition
 
    Partition 2 Type ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
    Partition ID f0071320-2603-48b7-a495-1ef43b926343
    FirstLBA 567296  Last LBA 387891934
    Attributes 0
    Partition Name                 Basic data partition
 
    Partition 3 Type de94bba4-6d1-4d40-a16a-bfd5179d6ac
    Partition ID ee34cd88-2b1c-420c-a260-378253744c2b
    FirstLBA 387893248  Last LBA 389687295
    Attributes 1
    Partition Name                                     
 
    Partition 4 Type de94bba4-6d1-4d40-a16a-bfd5179d6ac
    Partition ID 68fd52d2-be78-425c-84f-c02cded6625
    FirstLBA 389689344  Last LBA 390711295
    Attributes 1
    Partition Name                 Basic data partition
 
    Partition 5 Type ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
    Partition ID ac5955ae-ad4e-4c78-94d4-ca8c405266e2
    FirstLBA 390711296  Last LBA 976773119
    Attributes 0
    Partition Name                 Basic data partition
 
Disk Size: 500107862016 bytes
Sector size: 512 bytes
 
Done!
Infected: c:\windows\system32\mszquoa.exe --> [Adware.Yelloader]
Infected: c:\windows\system32\mszquoa.exe --> [Adware.Yelloader]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe --> [Trojan.Agent]
Infected: HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN|svcvmx --> [Trojan.Agent]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe --> [Trojan.Agent]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe --> [Adware.Yelloader]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe --> [Adware.Yelloader]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe --> [Adware.Yelloader]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe --> [Adware.Yelloader]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe --> [Adware.Yelloader]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe --> [Adware.Yelloader]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\regtool\regtool.exe --> [Trojan.Agent]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef.pak --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef_100_percent.pak --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef_200_percent.pak --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\cef_extensions.pak --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\d3dcompiler_47.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\debug.log --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\icudtl.dat --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\libcef.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\libEGL.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\libGLESv2.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\natives_blob.bin --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\pepflashplayer.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\snapshot_blob.bin --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\widevinecdm.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\widevinecdmadapter.dll --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\locales --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\locales\en-US.pak --> [Trojan.Clicker]
Infected: C:\Users\codyz\AppData\Local\ntuserlitelist\svcvmx\locales\zh-CN.pak --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\regtool --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef.pak --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef_100_percent.pak --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef_200_percent.pak --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\cef_extensions.pak --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\d3dcompiler_47.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\dbghelp.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\debug.log --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\icudtl.dat --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libcef.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libEGL.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\libGLESv2.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\natives_blob.bin --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\pepflashplayer.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\pepflashplayer.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\snapshot_blob.bin --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\uninstall --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\widevinecdm.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\widevinecdmadapter.dll --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\locales --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\locales\en-US.pak --> [Trojan.Clicker]
Infected: C:\Users\PC\AppData\Local\ntuserlitelist\svcvmx\locales\zh-CN.pak --> [Trojan.Clicker]
Infected: HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\PCW|Start --> [Hijack.DisabledPCW]
Scan finished
Creating System Restore point...
Cleaning up...
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Removal scheduling successful. System shutdown needed.
System shutdown occurred
=======================================
 
 
---------------------------------------
Malwarebytes Anti-Rootkit BETA 1.10.3.1001
 
© Malwarebytes Corporation 2011-2012
 
OS version: 10.0.9200 Windows 10 x64
 
Account is Administrative
 
Internet Explorer version: 11.726.15063.0
 
File system is: NTFS
Disk drives: C:\ DRIVE_FIXED, D:\ DRIVE_FIXED
CPU speed: 1.696000 GHz
Memory total: 6347169792, free: 4568424448
 
Downloaded database version: v2017.12.07.04
Downloaded database version: v2017.11.28.01
Initializing...
======================
Driver version: 4.3.0.15
------------ Kernel report ------------
     12/07/2017 02:45:09
------------ Loaded modules -----------
\SystemRoot\system32\ntoskrnl.exe
\SystemRoot\system32\hal.dll
\SystemRoot\system32\kd.dll
\SystemRoot\system32\mcupdate_GenuineIntel.dll
\SystemRoot\System32\drivers\msrpc.sys
\SystemRoot\System32\drivers\ksecdd.sys
\SystemRoot\System32\drivers\werkernel.sys
\SystemRoot\System32\drivers\CLFS.SYS
\SystemRoot\System32\drivers\tm.sys
\SystemRoot\system32\PSHED.dll
\SystemRoot\system32\BOOTVID.dll
\SystemRoot\System32\drivers\FLTMGR.SYS
\SystemRoot\System32\drivers\clipsp.sys
\SystemRoot\System32\drivers\cmimcext.sys
\SystemRoot\System32\drivers\ntosext.sys
\SystemRoot\system32\CI.dll
\SystemRoot\System32\drivers\cng.sys
\SystemRoot\system32\drivers\Wdf01000.sys
\SystemRoot\system32\drivers\WDFLDR.SYS
\SystemRoot\system32\drivers\SleepStudyHelper.sys
\SystemRoot\System32\Drivers\acpiex.sys
\SystemRoot\System32\Drivers\WppRecorder.sys
\SystemRoot\System32\drivers\ACPI.sys
\SystemRoot\System32\drivers\WMILIB.SYS
\SystemRoot\System32\drivers\intelpep.sys
\SystemRoot\system32\drivers\WindowsTrustedRT.sys
\SystemRoot\System32\drivers\WindowsTrustedRTProxy.sys
\SystemRoot\System32\drivers\ndilgtad.sys
\SystemRoot\System32\drivers\msisadrv.sys
\SystemRoot\System32\drivers\pci.sys
\SystemRoot\System32\drivers\vdrvroot.sys
\SystemRoot\system32\drivers\pdc.sys
\SystemRoot\system32\drivers\CEA.sys
\SystemRoot\System32\drivers\partmgr.sys
\SystemRoot\System32\drivers\spaceport.sys
\SystemRoot\System32\drivers\volmgr.sys
\SystemRoot\System32\drivers\volmgrx.sys
\SystemRoot\System32\drivers\mountmgr.sys
\SystemRoot\System32\drivers\storahci.sys
\SystemRoot\System32\drivers\storport.sys
\SystemRoot\System32\drivers\EhStorClass.sys
\SystemRoot\System32\drivers\fileinfo.sys
\SystemRoot\System32\Drivers\Wof.sys
\SystemRoot\system32\drivers\WdFilter.sys
\SystemRoot\System32\Drivers\NTFS.sys
\SystemRoot\System32\Drivers\Fs_Rec.sys
\SystemRoot\system32\drivers\ndis.sys
\SystemRoot\system32\drivers\NETIO.SYS
\SystemRoot\System32\Drivers\ksecpkg.sys
\SystemRoot\System32\drivers\tcpip.sys
\SystemRoot\System32\drivers\fwpkclnt.sys
\SystemRoot\System32\drivers\wfplwfs.sys
\SystemRoot\System32\DRIVERS\fvevol.sys
\SystemRoot\System32\drivers\volume.sys
\SystemRoot\System32\drivers\volsnap.sys
\SystemRoot\System32\drivers\rdyboost.sys
\SystemRoot\System32\Drivers\mup.sys
\SystemRoot\system32\drivers\iorate.sys
\SystemRoot\System32\drivers\IntelPcc.sys
\SystemRoot\System32\drivers\disk.sys
\SystemRoot\System32\drivers\CLASSPNP.SYS
\SystemRoot\System32\Drivers\crashdmp.sys
\SystemRoot\System32\drivers\cdrom.sys
\SystemRoot\system32\drivers\filecrypt.sys
\SystemRoot\system32\drivers\tbs.sys
\SystemRoot\System32\Drivers\Null.SYS
\SystemRoot\System32\Drivers\Beep.SYS
\SystemRoot\System32\drivers\BasicDisplay.sys
\SystemRoot\System32\drivers\watchdog.sys
\SystemRoot\System32\drivers\dxgkrnl.sys
\SystemRoot\System32\drivers\vmbkmclr.sys
\SystemRoot\System32\drivers\BasicRender.sys
\SystemRoot\System32\Drivers\Npfs.SYS
\SystemRoot\System32\Drivers\Msfs.SYS
\SystemRoot\system32\DRIVERS\tdx.sys
\SystemRoot\system32\DRIVERS\TDI.SYS
\SystemRoot\System32\DRIVERS\netbt.sys
\SystemRoot\system32\drivers\afd.sys
\SystemRoot\System32\drivers\vwififlt.sys
\SystemRoot\System32\drivers\pacer.sys
\SystemRoot\system32\drivers\netbios.sys
\SystemRoot\system32\DRIVERS\rdbss.sys
\??\C:\WINDOWS\System32\drivers\zamguard64.sys
\SystemRoot\system32\drivers\nsiproxy.sys
\SystemRoot\System32\drivers\npsvctrig.sys
\SystemRoot\System32\drivers\mssmbios.sys
\SystemRoot\System32\drivers\gpuenergydrv.sys
\SystemRoot\System32\Drivers\dfsc.sys
\SystemRoot\system32\DRIVERS\ahcache.sys
\SystemRoot\System32\drivers\pneteth.sys
\SystemRoot\System32\DriverStore\FileRepository\compositebus.inf_amd64_de4c68ea4fb1be53\CompositeBus.sys
\SystemRoot\System32\drivers\kdnic.sys
\SystemRoot\System32\drivers\umbus.sys
\SystemRoot\System32\drivers\CAD.sys
\SystemRoot\system32\DRIVERS\igdkmd64.sys
\SystemRoot\System32\drivers\HDAudBus.sys
\SystemRoot\System32\drivers\portcls.sys
\SystemRoot\System32\drivers\drmk.sys
\SystemRoot\System32\drivers\ks.sys
\SystemRoot\System32\drivers\dptf_cpu.sys
\SystemRoot\System32\drivers\USBXHCI.SYS
\SystemRoot\system32\drivers\ucx01000.sys
\SystemRoot\System32\drivers\TeeDriverW8x64.sys
\SystemRoot\System32\drivers\rt640x64.sys
\SystemRoot\System32\drivers\athw8x.sys
\SystemRoot\System32\drivers\vwifibus.sys
\SystemRoot\System32\drivers\i8042prt.sys
\SystemRoot\System32\drivers\mouclass.sys
\SystemRoot\System32\drivers\kbdclass.sys
\SystemRoot\System32\drivers\iaLPSSi_I2C.sys
\SystemRoot\system32\drivers\SpbCx.sys
\SystemRoot\System32\drivers\CmBatt.sys
\SystemRoot\System32\drivers\BATTC.SYS
\SystemRoot\System32\drivers\intelppm.sys
\SystemRoot\System32\drivers\acpipagr.sys
\SystemRoot\System32\drivers\wmiacpi.sys
\SystemRoot\System32\drivers\AsRadioControl.sys
\SystemRoot\System32\drivers\HIDCLASS.SYS
\SystemRoot\System32\drivers\HIDPARSE.SYS
\SystemRoot\System32\drivers\msgpiowin32.sys
\SystemRoot\System32\drivers\UEFI.sys
\SystemRoot\System32\drivers\NdisVirtualBus.sys
\SystemRoot\System32\drivers\swenum.sys
\SystemRoot\System32\drivers\rdpbus.sys
\SystemRoot\system32\drivers\ksthunk.sys
\SystemRoot\system32\drivers\RTKVHD64.sys
\SystemRoot\system32\DRIVERS\kxspb.sys
\SystemRoot\System32\drivers\UsbHub3.sys
\SystemRoot\System32\drivers\USBD.SYS
\SystemRoot\System32\drivers\usbccgp.sys
\SystemRoot\system32\DRIVERS\btfilter.sys
\SystemRoot\System32\drivers\BTHUSB.sys
\SystemRoot\System32\drivers\bthport.sys
\SystemRoot\System32\drivers\hidusb.sys
\SystemRoot\System32\drivers\mouhid.sys
\SystemRoot\system32\Drivers\RtsUer.sys
\SystemRoot\System32\Drivers\usbvideo.sys
\SystemRoot\System32\Drivers\fastfat.SYS
\SystemRoot\System32\Drivers\dump_diskdump.sys
\SystemRoot\System32\Drivers\dump_storahci.sys
\SystemRoot\System32\Drivers\dump_dumpfve.sys
\SystemRoot\System32\win32k.sys
\SystemRoot\System32\win32kfull.sys
\SystemRoot\System32\win32kbase.sys
\SystemRoot\System32\drivers\dxgmms2.sys
\SystemRoot\System32\drivers\monitor.sys
\SystemRoot\System32\TSDDD.dll
\SystemRoot\System32\cdd.dll
\SystemRoot\system32\drivers\WudfPf.sys
\SystemRoot\system32\DRIVERS\esif_lf.sys
\SystemRoot\System32\drivers\WUDFRd.sys
\SystemRoot\system32\drivers\wcifs.sys
\SystemRoot\system32\drivers\luafv.sys
\SystemRoot\system32\drivers\storqosflt.sys
\SystemRoot\system32\drivers\mmcss.sys
\SystemRoot\System32\drivers\registry.sys
\SystemRoot\system32\drivers\lltdio.sys
\SystemRoot\system32\drivers\mslldp.sys
\SystemRoot\system32\drivers\rspndr.sys
\SystemRoot\System32\DRIVERS\wanarp.sys
\SystemRoot\system32\DRIVERS\nwifi.sys
\SystemRoot\system32\drivers\ndisuio.sys
\SystemRoot\system32\drivers\HTTP.sys
\SystemRoot\System32\drivers\mpsdrv.sys
\SystemRoot\system32\DRIVERS\bowser.sys
\SystemRoot\system32\DRIVERS\mrxsmb.sys
\SystemRoot\System32\drivers\vwifimp.sys
\SystemRoot\system32\DRIVERS\mrxsmb20.sys
\SystemRoot\System32\DRIVERS\srvnet.sys
\SystemRoot\system32\DRIVERS\mrxsmb10.sys
\SystemRoot\system32\drivers\Ndu.sys
\SystemRoot\system32\drivers\peauth.sys
\SystemRoot\System32\drivers\tcpipreg.sys
\SystemRoot\System32\DRIVERS\srv2.sys
\SystemRoot\System32\DRIVERS\srv.sys
\SystemRoot\System32\drivers\condrv.sys
\SystemRoot\system32\Drivers\WdNisDrv.sys
\??\C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{7BAFCF7D-93D5-4E6A-9823-AC4394BDA478}\MpKsl6388aba5.sys
\??\C:\WINDOWS\system32\drivers\mbamchameleon.sys
\??\C:\WINDOWS\system32\drivers\2424C798.sys
----------- End -----------
Done!
 
Scan started
Database versions:
  main:    v2017.12.07.04
  rootkit: v2017.10.14.01
 
<<<2>>>
Physical Sector Size: 512
Drive: 0, DevicePointer: 0xffffe58ad0ee7060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
--------- Disk Stack ------
DevicePointer: 0xffffe58ad0e099f0, DeviceName: Unknown, DriverName: \Driver\partmgr\
DevicePointer: 0xffffe58ad0ee7060, DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
DevicePointer: 0xffffe58ad05b2e40, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xffffe58ad05b0e40, DeviceName: Unknown, DriverName: \Driver\ACPI\
DevicePointer: 0xffffe58ad05c23c0, DeviceName: \Device\0000003b\, DriverName: \Driver\storahci\
------------ End ----------
Alternate DeviceName: \Device\Harddisk0\DR0\, DriverName: \Driver\Disk\
Upper DeviceData: 0x0, 0x0, 0x0
Lower DeviceData: 0x0, 0x0, 0x0
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
<<<2>>>
<<<3>>>
Volume: C:
File system type: NTFS
SectorSize = 512, ClusterSize = 4096, MFTRecordSize = 1024, MFTIndexSize = 4096 bytes
Scanning drivers directory: C:\WINDOWS\SYSTEM32\drivers...
Done!
Drive 0
This is a System drive
Scanning MBR on drive 0...
Inspecting partition table:
This drive is a GPT Drive.
MBR Signature: 55AA
Disk Signature: D60A0684
 
GPT Protective MBR Partition information:
 
    Partition 0 type is EFI-GPT (0xee)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 1  Numsec = 4294967295
 
    Partition 1 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 2 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
    Partition 3 type is Empty (0x0)
    Partition is NOT ACTIVE.
    Partition starts at LBA: 0  Numsec = 0
 
GPT Partition information:
 
    GPT Header Signature 4546492050415254
    GPT Header Revision 65536 Size 92 CRC 1021068967
    GPT Header CurrentLba = 1 BackupLba 976773167
    GPT Header FirstUsableLba 34  LastUsableLba 976773134
    GPT Header Guid 4e9b347d-576-4a4d-884-757744101256
    GPT Header Contains 128 partition entries starting at LBA 2
    GPT Header Partition entry size = 128
 
    Backup GPT header Signature 4546492050415254
    Backup GPT header Revision 65536 Size 92 CRC 1021068967
    Backup GPT header CurrentLba = 976773167 BackupLba 1
    Backup GPT header FirstUsableLba 34  LastUsableLba 976773134
    Backup GPT header Guid 4e9b347d-576-4a4d-884-757744101256
    Backup GPT header Contains 128 partition entries starting at LBA 976773135
    Backup GPT header Partition entry size = 128
 
    Partition 0 Type c12a7328-f81f-11d2-ba4b-0a0c93ec93b
    Partition ID c786ee91-59ec-450e-9567-731af4551d73
    FirstLBA 2048  Last LBA 534527
    Attributes 0
    Partition Name                 EFI system partition
 
    GPT Partition 0 is bootable
    Partition 1 Type e3c9e316-b5c-4db8-817d-f92df0215ae
    Partition ID 4dd5c299-ff2b-4dd4-ba67-89f0624cf228
    FirstLBA 534528  Last LBA 567295
    Attributes 0
    Partition Name         Microsoft reserved partition
 
    Partition 2 Type ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
    Partition ID f0071320-2603-48b7-a495-1ef43b926343
    FirstLBA 567296  Last LBA 387891934
    Attributes 0
    Partition Name                 Basic data partition
 
    Partition 3 Type de94bba4-6d1-4d40-a16a-bfd5179d6ac
    Partition ID ee34cd88-2b1c-420c-a260-378253744c2b
    FirstLBA 387893248  Last LBA 389687295
    Attributes 1
    Partition Name                                     
 
    Partition 4 Type de94bba4-6d1-4d40-a16a-bfd5179d6ac
    Partition ID 68fd52d2-be78-425c-84f-c02cded6625
    FirstLBA 389689344  Last LBA 390711295
    Attributes 1
    Partition Name                 Basic data partition
 
    Partition 5 Type ebd0a0a2-b9e5-4433-87c0-68b6b72699c7
    Partition ID ac5955ae-ad4e-4c78-94d4-ca8c405266e2
    FirstLBA 390711296  Last LBA 976773119
    Attributes 0
    Partition Name                 Basic data partition
 
Disk Size: 500107862016 bytes
Sector size: 512 bytes
 
Done!
 

 



#4 buddy215

buddy215

  • BC Advisor
  • 12,267 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:08:31 PM

Posted 07 December 2017 - 10:03 AM

Okay....see if you can complete the cleaning and scans below.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Malwarebytes - Clean Mode

  • Download and install the free version of Malwarebytes
    Note: If you have Malwarebytes already installed, you don't need to install it again. Simply start from the next bullet point
  • Once Malwarebytes is installed, launch it and let it update its database. You might have to click on the little arrow by Scan Status in the middle right pane for it to do so
  • Once the database update is complete, click on the Scan tab, then select the Threat Scan button and click on Start Scan
  • Let the scan run, the time required to complete the scan depends of your system and computer specs
  • Once the scan is complete, make sure that the first checkbox at the top is checked (which will automatically check every detected item), then click on the Quarantine Selected button
    • If it asks you to restart your computer to complete the removal, do so
  • Click on Export Summary after the deletion (in the bottom-left corner) and select Copy to Clipboard. Paste the content in your next reply

Download AdwCleaner by Xplode onto your desktop. (compatible with Windows 7, 8 and 10)

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.

 

Download and run the FREE online scanner from Free Virus Scan | Online Virus Scan from ESET | ESET

  • Place a checkmark in YES, I accept the Terms of Use, then click Start. Wait for ESET Online Scanner to load its components.
  • Select Enable detection of potentially unwanted applications.
  • Click Advanced Settings, then place a checkmark in the following:
    • Remove found threats
    • Scan archives
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Click Start to begin scanning.
  • ESET Online Scanner will start downloading signatures and scan. Please be patient, as this scan can take quite some time.
  • When the scan is done, click List threats (only available if ESET Online Scanner found something).
  • Click Export, then save the file to your desktop.
  • Click Back, then Finish to exit ESET Online Scanner.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#5 Mrsgreene9116

Mrsgreene9116
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:02:31 AM

Posted 07 December 2017 - 04:34 PM

I was able to download the CCleaner but not able to start it.  It kept giving me an error.  I did run the Malwarebytes and this is the log:
 
Malwarebytes
www.malwarebytes.com
 
-Log Details-
Scan Date: 12/7/17
Scan Time: 2:03 PM
Log File: 05993dd6-db92-11e7-a1ce-f832e401eb3f.json
Administrator: Yes
 
-Software Information-
Version: 3.3.1.2183
Components Version: 1.0.262
Update Package Version: 1.0.3438
License: Trial
 
-System Information-
OS: Windows 10 (Build 15063.726)
CPU: x64
File System: NTFS
User: NOTYOURS\PC
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 274691
Threats Detected: 25
Threats Quarantined: 25
Time Elapsed: 2 min, 13 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
 
-Scan Details-
Process: 0
(No malicious items detected)
 
Module: 0
(No malicious items detected)
 
Registry Key: 5
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\REI_AxControl.ReiEngine.1, Quarantined, [1068], [327197],1.0.3438
PUP.Optional.Reimage, HKLM\SOFTWARE\CLASSES\REI_AxControl.ReiEngine, Quarantined, [1068], [327197],1.0.3438
PUP.Optional.OnlineIO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{0436402E-77C5-449F-AC1B-E1E877FBBF4A}, Quarantined, [503], [317311],1.0.3438
PUP.Optional.OnlineIO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{DC1B1147-F80C-4B1B-A940-60F348D65949}, Quarantined, [503], [317311],1.0.3438
PUP.Optional.OnlineIO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F8741B98-39C2-471E-84EC-4DA51BC221D5}, Quarantined, [503], [317311],1.0.3438
 
Registry Value: 3
PUP.Optional.OnlineIO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{0436402E-77C5-449F-AC1B-E1E877FBBF4A}|PATH, Quarantined, [503], [317311],1.0.3438
PUP.Optional.OnlineIO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{DC1B1147-F80C-4B1B-A940-60F348D65949}|PATH, Quarantined, [503], [317311],1.0.3438
PUP.Optional.OnlineIO, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{F8741B98-39C2-471E-84EC-4DA51BC221D5}|PATH, Quarantined, [503], [317311],1.0.3438
 
Registry Data: 0
(No malicious items detected)
 
Data Stream: 0
(No malicious items detected)
 
Folder: 2
PUP.Optional.WindowService, C:\WINDOWS\TEMP\WS, Quarantined, [592], [407225],1.0.3438
PUP.Optional.OnlineIO, C:\WINDOWS\INSTALLER\{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}, Quarantined, [503], [391425],1.0.3438
 
File: 15
PUP.Optional.WindowService, C:\WINDOWS\TEMP\WS\ATI.EXE, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\00E4001650C7508C1E40B652E5E2494D, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\ati_upd.dll, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\mediatek_86.InstallLog, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\mediatek_86.InstallState, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\mediatek_86.lib.dll, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\Newtonsoft.Json.dll, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\Newtonsoft.Json.xml, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\NLog.config, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\NLog.dll, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\NLog.xml, Quarantined, [592], [407225],1.0.3438
PUP.Optional.WindowService, C:\Windows\Temp\WS\state, Quarantined, [592], [407225],1.0.3438
PUP.Optional.OnlineIO, C:\WINDOWS\INSTALLER\SOURCEHASH{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}, Quarantined, [503], [391431],1.0.3438
PUP.Optional.OnlineIO, C:\Windows\Installer\{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}\online.exe, Quarantined, [503], [391425],1.0.3438
PUP.Optional.OnlineIO, C:\Windows\Installer\{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}\SystemFoldermsiexec.exe, Quarantined, [503], [391425],1.0.3438
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)
 
 
 
***This is the ADW log:
 
 
# AdwCleaner 7.0.5.0 - Logfile created on Thu Dec 07 21:17:03 2017
# Updated on 2017/29/11 by Malwarebytes 
# Running on Windows 10 Home (X64)
# Mode: clean
 
***** [ Services ] *****
 
No malicious services deleted.
 
***** [ Folders ] *****
 
No malicious folders deleted.
 
***** [ Files ] *****
 
No malicious files deleted.
 
***** [ DLL ] *****
 
No malicious DLLs cleaned.
 
***** [ WMI ] *****
 
No malicious WMI cleaned.
 
***** [ Shortcuts ] *****
 
No malicious shortcuts cleaned.
 
***** [ Tasks ] *****
 
No malicious tasks deleted.
 
***** [ Registry ] *****
 
No malicious registry entries deleted.
 
***** [ Firefox (and derivatives) ] *****
 
No malicious Firefox entries deleted.
 
***** [ Chromium (and derivatives) ] *****
 
No malicious Chromium entries deleted.
 
*************************
 
::Tracing keys deleted
::Winsock settings cleared
::Additional Actions: 0
 
 
 
*************************
 
C:/AdwCleaner/AdwCleaner[C0].txt - [4592 B] - [2017/12/2 14:57:25]
C:/AdwCleaner/AdwCleaner[C1].txt - [1561 B] - [2017/12/2 15:7:19]
C:/AdwCleaner/AdwCleaner[C2].txt - [1518 B] - [2017/12/2 15:20:10]
C:/AdwCleaner/AdwCleaner[S0].txt - [5066 B] - [2017/12/2 14:41:26]
C:/AdwCleaner/AdwCleaner[S1].txt - [1420 B] - [2017/12/2 15:6:11]
C:/AdwCleaner/AdwCleaner[S2].txt - [1352 B] - [2017/12/2 15:18:12]
C:/AdwCleaner/AdwCleaner[S3].txt - [1351 B] - [2017/12/7 21:16:42]
 
 
########## EOF - C:\AdwCleaner\AdwCleaner[C3].txt ##########
 
 
**I ran the free online virus scan and no threats were found.


#6 buddy215

buddy215

  • BC Advisor
  • 12,267 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:08:31 PM

Posted 07 December 2017 - 05:11 PM

Uninstall CCleaner and attempt to download and reinstall. I haven't had anyone to not be able to run CCleaner so that

is the only solution that I can think of.

 

Do you have an ad blocker installed in your browsers?

 

  • download Security Check by glax24 and save the file to the Desktop
  • Run the tool by accepting all the Security prompts
  • when complete the tool will produce a log file C:\SecurityCheck\SecurityCheck.txt and also copy the contents to the Clipboard
  • Simply Paste the log to your reply

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#7 Mrsgreene9116

Mrsgreene9116
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:02:31 AM

Posted 07 December 2017 - 10:54 PM

I was able to download and run CCleaner and here is the log from Security Check:

 

SecurityCheck by glax24 & Severnyj v.1.4.0.53 [27.10.17]
WebSite: www.safezone.cc
DateLog: 07.12.2017 20:50:29
Path starting: C:\Users\PC\AppData\Local\Temp\SecurityCheck\SecurityCheck.exe
Log directory: C:\SecurityCheck\
IsAdmin: True
User: PC
VersionXML: 4.77is-06.12.2017
___________________________________________________________________________
 
Windows 10(6.3.15063) (x64) Core Release: 1703 Lang: English(0409)
Installation date OS: 27.07.2017 06:10:00
LicenseStatus: Windows®, Core edition The machine is permanently activated.
Boot Mode: Normal
Default Browser: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe
SystemDrive: C: FS: [NTFS] Capacity: [184.7 Gb] Used: [49.6 Gb] Free: [135.1 Gb]
------------------------------- [ Windows ] -------------------------------
Internet Explorer 11.726.15063.0
User Account Control enabled (Level 3)
Windows Update (wuauserv) - The service has stopped
Security Center (wscsvc) - The service is running
Remote Registry (RemoteRegistry) - The service has stopped
SSDP Discovery (SSDPSRV) - The service is running
Remote Desktop Services (TermService) - The service has stopped
Windows Remote Management (WS-Management) (WinRM) - The service has stopped
---------------------------- [ Antivirus_WMI ] ----------------------------
Windows Defender (enabled and up to date)
--------------------------- [ FirewallWindows ] ---------------------------
Windows Firewall (MpsSvc) - The service is running
--------------------------- [ AntiSpyware_WMI ] ---------------------------
Windows Defender (enabled and up to date)
-------------------------- [ SecurityUtilities ] --------------------------
Malwarebytes version 3.3.1.2183 v.3.3.1.2183
------------------------------- [ Browser ] -------------------------------
Google Chrome v.60.0.3112.78 Warning! Download Update
--------------------------- [ RunningProcess ] ----------------------------
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe v.60.0.3112.78
------------------ [ AntivirusFirewallProcessServices ] -------------------
C:\Program Files\Malwarebytes\Anti-Malware\mbamtray.exe v.3.0.0.1284
Malwarebytes Service (MBAMService) - The service is running
C:\Program Files\Malwarebytes\Anti-Malware\MBAMService.exe v.3.1.0.595
C:\ProgramData\Microsoft\Windows Defender\Platform\4.12.17007.17123-0\MsMpEng.exe v.4.12.17007.17123
C:\ProgramData\Microsoft\Windows Defender\Platform\4.12.17007.17123-0\NisSrv.exe v.4.12.17007.17123
C:\Program Files\Windows Defender\MSASCuiL.exe v.4.11.15063.0
Windows Defender Antivirus Service (WinDefend) - The service is running
Windows Defender Antivirus Network Inspection Service (WdNisSvc) - The service is running
----------------------------- [ End of Log ] ------------------------------


#8 buddy215

buddy215

  • BC Advisor
  • 12,267 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:08:31 PM

Posted 08 December 2017 - 08:51 AM

I suggest you run both Malwarebytes and MBAR again in a day or two. Other than than if

you are not seeing anything malware related occuring I would say you are good to go.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#9 Mrsgreene9116

Mrsgreene9116
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Gender:Female
  • Local time:02:31 AM

Posted 08 December 2017 - 03:03 PM

Would you suggest any other antivirus other than the preinstalled windows defender?  and thank you very much!!



#10 buddy215

buddy215

  • BC Advisor
  • 12,267 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:08:31 PM

Posted 08 December 2017 - 03:23 PM

If I were using Windows I would purchase Malwarebytes and continue using the Windows security program.

There are free antivirus programs such as Avast. Be aware that most...including Avast...will bundle adware with

their free products. You can remove the adware.

 

You're welcome...happy surfin'

 

If you don't have an ad blocker installed in Google Chrome I suggest you use this one. Adblock Plus - Chrome Web Store

 

You can block third party cookies...also known as ad and tracking cookies....from installing in your browsers.

Once they are blocked...run CCleaner to remove the existing ones.

How to disable third-party cookies in all major web browsers


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users