# CLOSED Windows Data Entry Prevention Issue

## Recommended Posts

I currently have Emsisoft on my Computer (Vista Home Premium 32 Bit) but an having problems with my Windows Vista applications.

1)I keep getting Windows Command prompts being closed,

2) Multiple "Default IME" showing in Task Manager

3) Multiple "Internet Explorer" in Task manager

4) Emsisoft Full scan will not completely run to conclusion.

5)The computer is running extremely slow.

I attached the Text files your website requested from Emsisoft Emergency Kit and Farbar Recovery Scan Tool. (I had to download them to a USB flash drive because my computer was running too slow.

a2scan_150306-225258.txt

FRST.txt

Shortcut.txt

##### Share on other sites

Do the following:

1. Close all open programs and Internet browsers (you may want to print our or write down these instructions first).
2. Double click on adwcleaner.exe to run the tool.
3. Click on the Scan button.
4. After the scan has finished, click on the Clean button.
5. Confirm each time with OK.
6. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop.
8. If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.

1. Shut down your anti-virus, anti-spyware, and firewall software now to avoid potential conflicts.
2. Run the tool by double-clicking it. If you are using Windows Vista or Windows 7, right-click it and select Run as administrator.
3. The tool will open and start scanning your system.
4. Please be patient as this can take a while to complete depending on your system's specifications.
5. On completion, a log is saved to your desktop and will automatically open.
6. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply.

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

HKLM\...\Run: [PackageTracer EPM Support] => "C:\PROGRA~1\PACKAG~2\bar\1.bin\69medint.exe" T8EPMSUP.DLL,S
HKLM\...\Run: [PackageTracer AppIntegrator 32-bit] => C:\PROGRA~1\PACKAG~2\bar\1.bin\AppIntegrator.exe
HKLM\...\Run: [PackageTracer Search Scope Monitor] => "C:\PROGRA~1\PACKAG~2\bar\1.bin\69srchmn.exe" /m=2 /w /h
HKLM\...D6A79037F57F\InprocServer32: [Default-fastprox] fastprox.dll ATTENTION! ====> ZeroAccess?
HKLM\...\Policies\Explorer: [NoSetActiveDesktop] 0
HKU\S-1-5-19\...\Policies\Explorer: [NoSetActiveDesktop] 0
HKU\S-1-5-20\...\Policies\Explorer: [NoSetActiveDesktop] 0
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Run: [Utkgmedia] => regsvr32.exe C:\Users\Administrator\AppData\Local\Utkgmedia\PCommonWeb16.dll <===== ATTENTION
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Run: [BarzeTjigd] => regsvr32.exe "C:\ProgramData\BarzeTjigd\WuboYqaj.puf"
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Policies\Explorer: [NoSetActiveDesktop] 0
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Policies\Explorer: [HideSCAHealth] 1
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...\Winlogon: [Shell] C:\Windows\explorer.exe [2926592 2009-04-11] (Microsoft Corporation) <==== ATTENTION
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\...409d6c4515e9\InprocServer32: [Default-shell32] C:\$Recycle.Bin\S-1-5-21-1888392662-1405933057-3862161106-500\$304064af4c6e2371af2a766cf69caa1d\n. ATTENTION! ====> ZeroAccess?
HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\SOFTWARE\Policies\Microsoft\Internet Explorer: Policy restriction <======= ATTENTION
SearchScopes: HKU\S-1-5-21-1888392662-1405933057-3862161106-500 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKU\S-1-5-21-1888392662-1405933057-3862161106-500 -> {171DEBEB-C3D4-40b7-AC73-056A5EBA4A7E} URL =
Toolbar: HKLM - No Name - {EF99BD32-C1FB-11D2-892F-0090271D4F88} -  No File
Toolbar: HKLM - PackageTracer - {ff343558-d5a5-454a-bdd8-c5c81e179fed} - C:\Program Files\PackageTracer_69\bar\1.bin\69bar.dll No File
Toolbar: HKU\S-1-5-21-1888392662-1405933057-3862161106-500 -> No Name - {2318C2B1-4965-11D4-9B18-009027A5CD4F} -  No File
Winsock: Catalog5 01 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\system32\NLAapi.dll"
Winsock: Catalog5 05 mswsock.dll File Not found () ATTENTION: The LibraryPath should be "%SystemRoot%\System32\mswsock.dll"
FF Plugin: @PackageTracer_69.com/Plugin -> C:\Program Files\PackageTracer_69\bar\1.bin\NP69Stub.dll No File
S2 PackageTracer_69Service; C:\PROGRA~1\PACKAG~2\bar\1.bin\69barsvc.exe [X]
S2 Winmgmt; C:\PROGRA~2\b34btbztdb0vavaw.exe [X]
2015-03-03 16:48 - 2015-03-03 16:48 - 00000000 ____D () C:\ProgramData\BarzeTjigd
2015-02-28 15:17 - 2015-03-06 22:41 - 00000000 ___HD () C:\ProgramData\{49A0BAC7-3326-4433-9373-4AA8793ABB5C}
2013-05-19 12:19 - 2013-05-19 12:19 - 0030784 _____ () C:\Users\Administrator\AppData\Roaming\fd_ck588.dat
2013-11-10 21:57 - 2013-11-17 14:32 - 0000004 _____ () C:\Users\Administrator\AppData\Roaming\icon.ico
2013-09-20 13:48 - 2013-09-20 22:24 - 0000004 _____ () C:\Users\Administrator\AppData\Roaming\settings.ini
2011-01-16 17:17 - 2009-03-02 17:48 - 0076407 _____ () C:\Users\Administrator\AppData\Roaming\Smiley.ico
2013-05-15 05:47 - 2013-05-15 05:47 - 0076627 _____ () C:\Users\Administrator\AppData\Roaming\Smiley.ico.html
2010-01-11 16:50 - 2015-03-07 10:01 - 0008484 _____ () C:\Users\Administrator\AppData\Local\d3d9caps.dat
2011-12-23 12:36 - 2011-12-23 12:55 - 0012828 ___SH () C:\Users\Administrator\AppData\Local\d426srv353477028r6374sqs35m8d
2010-01-11 21:06 - 2013-10-05 11:08 - 0018432 _____ () C:\Users\Administrator\AppData\Local\DCBC2A71-70D8-4DAN-EHR8-E0D61DEA3FDF.ini
2012-01-22 10:44 - 2012-01-22 10:44 - 0000000 _____ () C:\Users\Administrator\AppData\Local\{7A39D6E2-8A64-49DD-947A-F1D6962D06AA}
2011-05-19 04:23 - 2011-10-15 07:26 - 0001940 _____ () C:\Users\Administrator\AppData\Local\{96C87F53-AC72-4604-A9CC-186A49F17F3C}.ini
2013-12-25 15:07 - 2013-12-25 15:07 - 95025368 ____T () C:\ProgramData\0qfr70od.fee
2013-12-25 15:07 - 2013-12-25 15:07 - 0000000 _____ () C:\ProgramData\0qfr70od.odd
2013-08-21 04:58 - 2013-08-21 04:58 - 2250054 _____ () C:\ProgramData\1.bmp
2013-08-21 04:58 - 2013-08-21 04:58 - 0350795 _____ () C:\ProgramData\1.jpg
2011-12-23 12:36 - 2011-12-23 12:55 - 0012828 ___SH () C:\ProgramData\d426srv353477028r6374sqs35m8d
2013-10-17 09:44 - 2013-10-17 09:44 - 0000000 _____ () C:\ProgramData\e3lcjbnw.ctrl
2013-10-17 09:44 - 2013-10-17 09:46 - 95025368 ____T () C:\ProgramData\e3lcjbnw.pff
2013-06-27 16:16 - 2013-06-27 18:37 - 0000000 _____ () C:\ProgramData\g252qs.txt
2010-02-16 20:13 - 2010-02-16 20:21 - 0000773 ____H () C:\ProgramData\hpzinstall.log
2012-04-15 11:35 - 2015-02-22 14:11 - 0001177 _____ () C:\ProgramData\Microsoft.SqlServer.Compact.400.32.bc
2013-06-27 16:16 - 2013-06-27 18:37 - 95023320 ____T () C:\ProgramData\mjv0t.pad
2010-01-11 17:03 - 2012-01-19 18:29 - 0071607 ____H () C:\ProgramData\nvModes.001
2010-01-11 17:03 - 2012-01-19 18:29 - 0071607 ____H () C:\ProgramData\nvModes.dat
2013-06-27 16:16 - 2013-06-27 16:16 - 0044544 _____ (Microsoft Corporation) C:\ProgramData\sdaksda.txt
2012-01-19 18:21 - 2012-01-19 18:31 - 0000448 ____H () C:\ProgramData\tqTWd4O40bP6RL
2012-01-19 19:07 - 2012-01-19 19:15 - 0000448 ____H () C:\ProgramData\wtoYRgJxAMQF8Z
2012-01-19 18:21 - 2012-01-19 18:31 - 0000296 ____H () C:\ProgramData\~tqTWd4O40bP6RL
2012-01-19 18:21 - 2012-01-19 18:31 - 0000176 ____H () C:\ProgramData\~tqTWd4O40bP6RLr
2012-01-19 19:16 - 2012-01-19 19:16 - 0000296 ____H () C:\ProgramData\~wtoYRgJxAMQF8Z
2012-01-19 19:16 - 2012-01-19 19:16 - 0000176 ____H () C:\ProgramData\~wtoYRgJxAMQF8Zr
C:\$Recycle.Bin\S-1-5-21-1888392662-1405933057-3862161106-500\$304064af4c6e2371af2a766cf69caa1d
C:\$Recycle.Bin\S-1-5-18\$304064af4c6e2371af2a766cf69caa1d
C:\ProgramData\0qfr70od.fee
C:\ProgramData\0qfr70od.odd
C:\ProgramData\e3lcjbnw.ctrl
C:\ProgramData\e3lcjbnw.pff
CustomCLSID: HKU\S-1-5-21-1888392662-1405933057-3862161106-500_Classes\CLSID\{7a55cbb2-2b2e-4a41-9de1-6ac5d2c2be0a}\InprocServer32 -> C:\Program Files\UtilityChest_49\bar\1.bin\49SrcAs.dll No File
CustomCLSID: HKU\S-1-5-21-1888392662-1405933057-3862161106-500_Classes\CLSID\{97ef77e6-97be-4204-a890-2485903c5624}\InprocServer32 -> C:\Program Files\PackageTracer_69\bar\1.bin\69SrcAs.dll No File
HKU\.DEFAULT\Software\Classes\.exe: exefile => "%1" %* <===== ATTENTION!
HKU\.DEFAULT\Software\Classes\exefile: "%1" %* <===== ATTENTION!
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\Software\Classes\.exe: exefile => "%1" %* <===== ATTENTION!
HKU\S-1-5-21-1888392662-1405933057-3862161106-500\Software\Classes\exefile: "%1" %* <===== ATTENTION!

NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.

##### Share on other sites

I followed your instructions with the following issues:

1) I have a shortcut to some application called cryptolocker and my screen saver is the information in HELP_TO_SAVE_YOUR_FILES txt document attached.

This all happened while I was running the JRT application. I turned off my emsisoft anti-malware protection as instructed during the JRT scan. Not sure what happened.

Still need assistance.

Thank You

I re-ran JRT and did get the JRT log I will attach.

I re-ran the FRST and will attach the new fixlist.txt file.

I still have the cryptlocker shortcut on my desktop and the same issues I reported above.

HELP_TO_SAVE_YOUR_FILES.txt

HELP_TO_SAVE_YOUR_FILES.bmp

Shortcut.txt

Fixlog.txt

##### Share on other sites

Here are the files when I re-ran JRT and FRST.

Thanks

Fixlog (2).txt

JRT.txt

##### Share on other sites

Changing tools:

• Close all programs and disconnect any USB or external drives before running the tool.
• Double-click RogueKiller.exe to run the tool (Vista or 7 users: Right-click and select Run As Administrator).
• Once the Prescan has finished, click Scan.
• Once the Status box shows "Scan Finished", just close the program. <--Don't fix anything!
• The log can also be found on your desktop labeled (RKreport[X]_S_xxdatexx_xtimex)
• The highest number of [X], is the most recent Scan

##### Share on other sites

I completed your instructions and attached the RK report.

Thanks

RKreport_SCN_03122015_091306.log

##### Share on other sites

Close all programs and disconnect any USB or external drives before running the tool.

• Double-click RogueKiller.exe to run the tool again (Vista or 7 users: Right-click and select Run As Administrator).
• Once the Prescan has finished, click Scan.
• Once the Status box shows "Scan Finished".
• Click the Registry Tab and select the following items:
[Suspicious.Path] HKEY_USERS\S-1-5-21-1888392662-1405933057-3862161106-500\Software\Microsoft\Windows\CurrentVersion\Run | BarzeTjigd : regsvr32.exe "C:\ProgramData\BarzeTjigd\WuboYqaj.puf"  -> Found
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> Found
[PUM.DesktopIcons] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> Found
• Click the Files Tab and select the following items:
[ZeroAccess][Junction] $NtUninstallKB64629$ -- C:\Windows\$NtUninstallKB64629$ [[email protected] 0] >> ERROR 5 -> Found
• Click the Delete button.
• The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex)
• The highest number of [X], is the most recent Delete
Copy the below code to Notepad; Save As fixlist.txt to your Desktop.
C:\ProgramData\BarzeTjigd\WuboYqaj.puf
C:\ProgramData\BarzeTjigd
C:\Windows\$NtUninstallKB64629$

NOTE: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system to restart normally and let the tool complete its run after restart.

##### Share on other sites

I have completed your instructions and attached the test files requested.

Thanks

Fixlog.txt

RKreport_DEL_03122015_220111.log

##### Share on other sites

Since, your logs showed what appears to be a rather old ZeroAccess infection I would like to check the system with a tool that specifically targets that RootKit family.

• Double-click on TDSSKiller.exe to run the application.

• Click Change parameters

• Check the boxes next to Verify Driver Digital Signature and Detect TDLFS file system, then click OK

• Click on the Start Scan button to begin the scan and wait for it to finish.

NOTE: Do not use the computer during the scan!

• During the scan it will look similar to the image below:

• When it finishes, you will either see a report that no threats were found like below:

If no threats are found at this point, just click the Report selection on the top right of the form to generate a log. A log file report will pop which you can just close since the report file is already saved.

• If any infection or suspected items are found, you will see a window similar to below:

• If you have files that are shown to fail signature check do not take any action on these. Make sure you select Skip. I will tell you what to do with these later. They may not be issues at all.
• If Suspicious objects are detected, the default action will be Skip. Leave the default set to Skip.
• If Malicious objects are detected, they will show in the Scan results. TDSSKiller automatically selects an action (Cure or Delete) for malicious objects
• Make sure that Cure is selected. Important! - If Cure is not available, please choose Skip instead. Do not choose Delete unless instructed to do so.
• Click Continue to apply selected actions.
• A reboot may be required to complete disinfection. A window like the below will appear:

Reboot immediately if TDSSKiller states that one is needed.

• Whether an infection is found or not, a log file should have already been created on your C: drive (or whatever drive you boot from) in the root folder named something like TDSSKiller.2.1.1_27.12.2009_14.17.04_log.txt which is based on the program version # and date and time run.

##### Share on other sites

I completed your instructions and had 2 suspicious objects. Software advised "skip" and I did. No reboot instructed by the software. I attached the TDSSKiller text file.

Another issue:

I can't open my Turbo Tax program as my computer dosen't recognise the proper program to open the application. Does this hace something to do with that Cryptolocker Ransome ware I noticed earlier?

Thanks

TDSSKiller.3.0.0.44_13.03.2015_15.02.28_log.txt

##### Share on other sites

The TDSSKiller log looks fine. Yes, the CyptoLocker may have affected Turbo Tax.

Let's reset some areas of Windows to their defaults.

• Double-click tweaking.com_windows_repair_aio.zip and extract the Tweaking.com - Windows Repair folder to your desktop.
• Now open this folder and double-click Repair_Windows.exe.
• Click the Repairs tab on the far right.
• Click the Start button (bottom right)

Note: When asked if you would like to create a restore point. It is recommended just in-case something does not go as planned.

• Click Unselect All
• Put a checkmark in the following items:
• Reset Registry Permissions
• Reset File Permissions
• Remove Policies Set By Infections
• Repair Winsock & DNS Cache
• Repair Proxy Settings
• Repair Volume Shadow Copy Service
• Repair File Associations
• Repair bat Association
• Repair cmd Association
• Repair com Association
• Repair Directory Association
• Repair Drive Association
• Repair exe Association
• Repair Folder Association
• Repair inf Association
• Repair lnk (Shortcuts) Association
• Repair msc Association
• Repair reg Association
• Repair scr Association
• Restore Important Windows Services
• Set Windows Services To Default Startup
Note: Leave everything else unchecked
• Put a checkmark in Restart System When Finished
• Now click the Start button (bottom right)

##### Share on other sites

I still can"t open the Turbo Tax but the computer is running fine.

The text files I saved on my desktop are now showing ecc files and will not open. Is this still a problem?

I'am running Emsisolft Anti-Malware and the Online Armor Firewall

##### Share on other sites

Unfortunately, we are not able to decrypt encrypted files without the private encryption key. You may need to reinstall Turbo Tax.

##### Share on other sites

Reason: Lack of Response

PM either Kevin, Elise, or Arthur to have this thread reopened.

The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

All posters requesting Malware Removal assistance are required to follow all procedures in the thread titled START HERE, if you don't we are just going to send you back to this thread.