antares

Malware that can't be removed by Emsisoft

33 posts in this topic

Gentlemen:

I recently got infected by a piece of malware that locks me out of all my cleaning tools.  It won't let me install any new tools to deal the the problem.  It has even gone so far as to now allow me to reinstall Windows 10.  While  your software did remove some of the issues others remain and when after a reboot it notified me that those files could not be moved and thus on a rescan they remain detected.  Am posting a copy of  your report from the scanner.  An assistance you can provide would be helpful as I wish to regain access to my cleaning tools and to reinstall Windows 10 if needed.

Turtle Scan.txt

0

Share this post


Link to post
Share on other sites

Hello antares,
Welcome to the Emsisoft Support Forums. My name is Kevin, and I will be helping you with fixing your problems.
All users of the Emsisoft Support Forums who are in need of Malware Removal assistance are required to complete the procedures listed below:
NOTE: You will want to print these instructions for reference, as you will perform all scans with all browsers closed.
The majority of our support staff work Monday-Friday. We try very hard to answer all posts within 24-hours of the posting, but be aware that if you post anytime in the late afternoon or evening on Friday, or anytime on Saturday or Sunday, you will not receive an answer until Monday. Also, be aware that our support technicians may not be in the same time zone as you, therefore there could be several hours difference between when you post and the technician working your support case is available.
Take note of some guidelines for this support request:

  • Refrain from making any changes to your computer including installing/uninstall programs, deleting files, modifying the registry, and running scanners or tools. Doing so could cause changes to the directions I have to give you and prolong the time required. Furthermore, you should not be taking any advice relating to this computer from any other source throughout the course of this fix.
  • If you do not understand any step(s) provided, please do not hesitate to ask before continuing. I would much rather clarify instructions or explain them differently than have something important broken.
  • Even if things appear to be better, it might not mean we are finished. Please continue to follow my instructions and reply back until I give you the "all clean." We do not want to clean you part-way, only to have the system re-infect itself.
  • Do not start a new topic.
  • The logs that you post should be attached to the reply.
  • Set your system to show all files.
    Click Start, open My Computer, select the Tools menu and click Folder Options.
    Select the View Tab. Under the Hidden files and folders heading, select Show hidden files and folders.
    Uncheck: Hide file extensions for known file types
    Uncheck the Hide protected operating system files (recommended) option.
    Click Yes to confirm.


Download to your Desktop:
- Emsisoft Emergency Kit
- Farbar Recovery Scan Tool

  • NOTE: You need to run the version compatible with your system, if you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.


NOTE: If you are unable to download the tools from the infected system, the tools can be saved to and run from a USB flash drive.
All scans are to be run in Normal Mode. Do not run anything in "Safe Mode," unless you are instructed to do so by the Malware Removal Specialist handling your case.
Do not force Safe Mode. Instructions on How to Boot to "Safe Mode" can be found at: http://www.malwarete...kb/SafeMode.php
Let's get started:

  1. Install and Run Emsisoft Emergency Kit (EEK):
    • Double click EmergencyKitScanner.exe to install EEK
    • When the installation of EEK is complete the Emergency Kit Scanner will run.
      NOTE: Make sure to enable PUPs detection.
    • Click "Yes" to Update Emsisoft Emergency Kit
    • Under "Scan" click-on "Malware Scan".
      IMPORTANT: Do not quarantine or delete anything. We just want the scan log without anything being quarantined or deleted.
    • Save the scan log somewhere that you can find it.
    • Exit Emsisoft Emergency Kit.

  2. Run Farbar Recovery Scan Tool (FRST):
    • Double-click to run it. When the tool opens click Yes to the disclaimer.
    • Press Scan button.
    • Farbar Recovery Scan Tool will produce the following logs:
    • FRST.txt
    • Addition.txt

  3. Create a new topic in our Help, my PC is infected! forum and attach the following logs to your post:
    • Emsisoft Emergency Kit log (C:\EEK\Reports\)
    • FRST.txt
    • Addition.txt

    (NOTE: if you need to attach the logs to a reply to an existing topic, then you will need to use the More Reply Options button to the lower-right of where you type in your reply in order to see the controls for attaching files)


The procedures contained in this thread are for this user and this user only. Attempting to use the instructions in this thread on your system could result in damaging the Operating System beyond repair. Do not use any of the tools mentioned in this thread without the supervision of a Malware Removal Specialist.

0

Share this post


Link to post
Share on other sites

Kevin:

Thank you for your assistance in this matter.  All instructions will be complied with and I fully understand the need for time for a reply.  One doesn't expect instant answers but must be patient.

 As I have been working  on the situation things have improved. I am posting the original Emsisoft log alone with a copy of today's log.  As you can see I have reduced the number of detected  infections from 32 to 8. 

To make this situation clearer, this is a Windows 10 laptop and as such doesn't have the usual access that you mentioned through My Computer so I am unable to change file settings without know how its done under this new OS.  I am very new to Windows 10 and am still feeling my way  along.

The situation now is as follows:

1.  Any tool which I may have attempted to use is blocked with the phrase.."Attempted Resource is in use."

2.  Any attempt to install new software is likewise kept from installation with the same phrase.

3.  Any attempt to re-install Windows 10 is likewise blocked with the phrase "installation failed to start."

4.  Any attempt to delete Registry strings is likewise blocked.

That said here are the two log files you requested in the attachments  One is the original file run, the second if from today run.

Thank you for your assistance.

scan_170416-014925.txt

scan_170417-201531.txt

0

Share this post


Link to post
Share on other sites

Hi,

Restart the laptop to Safe Mode and try running FRST.  If it runs successfully attached the FRST scan logs to your reply.

0

Share this post


Link to post
Share on other sites

The scan had to be run in normal mode because instructions on the website are incorrect.  Even Microsoft's directions for Safe Mode do not work.  The FRSTScan was completed in normal more is attached.  However since I tried to run Safe Mode my Apps screen is 2/3 normal size and I do not know how to return it to normal.

FRST.txt

Addition.txt

0

Share this post


Link to post
Share on other sites

Do the following:

Download AdwCleaner and save it on your desktop.

  1. Close all open programs and Internet browsers (you may want to print our or write down these instructions first).
  2. Double click on adwcleaner.exe to run the tool.
  3. Click on the Scan button.
  4. After the scan has finished, click on the Clean button.
  5. Confirm each time with OK.
  6. You will be prompted to restart your computer. A text file will open in Notepad after the restart (this is the log of what was removed), which you can save on your desktop.
  7. Attach that log file to your reply by clicking the More Reply Options button to the lower-right of where you type in your reply.
    NOTE: If you lose that log file for any reason, you can find it at C:\AdwCleaner on your computer.


Download Junkware Removal Tool and save it on your desktop.

  1. Run the tool by double-clicking it.
  2. The tool will open and start scanning your system.
  3. Please be patient as this can take a while to complete depending on your system's specifications.
  4. On completion, a log is saved to your desktop and will automatically open.
  5. Attach the JRT log file to a reply by clicking the More Reply Options button to the lower-right of where you type in your reply.

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

CloseProcesses:
() C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe
() C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe
() C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe
() C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe
() C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe
() C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe
() C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe
HKLM-x32\...\Run: [cpx] => "C:\Users\Great Turtle\AppData\Local\ntuserlitelist\cpx\cpx.exe" -starup <===== ATTENTION
HKLM-x32\...\Run: [svcvmx] => C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe [896512 2017-01-13] ()
HKU\S-1-5-21-2847586871-285742337-784558086-1001\...\Run: [peidso] => rundll32.exe "C:\Users\Great Turtle\AppData\Local\peidso.dll",peidso <===== ATTENTION
HKU\S-1-5-21-2847586871-285742337-784558086-1001\...\Run: [WinResSync] => C:\WINDOWS\system32\regsvr32.exe /s "C:\Users\Great Turtle\AppData\Roaming\Microsoft\Protect\fd6963a1-125a-4406-9e2f-d0a50489cd51.rs" <===== ATTENTION
HKU\S-1-5-21-2847586871-285742337-784558086-1001\...\Run: [Spoutly.exe] => C:\Program Files (x86)\Spoutly\SpoutlyLauncher.exe <===== ATTENTION
HKU\S-1-5-21-2847586871-285742337-784558086-1001\...\RunOnce: [WinResSync] => C:\WINDOWS\system32\regsvr32.exe /s "C:\Users\Great Turtle\AppData\Roaming\Microsoft\Protect\fd6963a1-125a-4406-9e2f-d0a50489cd51.rs" <===== ATTENTION
HKU\S-1-5-21-2847586871-285742337-784558086-1001\...\MountPoints2: {49109181-040d-11e7-971a-141877cb02f8} - "E:\LaunchU3.exe" -a
HKU\S-1-5-18\...\Run: [WinResSync] => C:\WINDOWS\system32\regsvr32.exe /s "C:\Users\Great Turtle\AppData\Roaming\Microsoft\Protect\fd6963a1-125a-4406-9e2f-d0a50489cd51.rs" <===== ATTENTION
HKU\S-1-5-18\...\Run: [] => [X]
HKU\S-1-5-18\...\RunOnce: [WinResSync] => C:\WINDOWS\system32\regsvr32.exe /s "C:\Users\Great Turtle\AppData\Roaming\Microsoft\Protect\fd6963a1-125a-4406-9e2f-d0a50489cd51.rs" <===== ATTENTION
SearchScopes: HKU\S-1-5-21-2847586871-285742337-784558086-1001 -> DefaultScope {A34D5335-6CB4-4AA0-8F41-B9A86B54FB23} URL = 
SearchScopes: HKU\S-1-5-21-2847586871-285742337-784558086-1001 -> {A34D5335-6CB4-4AA0-8F41-B9A86B54FB23} URL = 
R2 Dataup; C:\Users\Great Turtle\AppData\Local\ntuserlitelist\dataup\dataup.exe [77824 2017-01-05] () [File not signed] <==== ATTENTION
S2 windowsmanagementservice; "C:\Users\Great Turtle\AppData\Local\obgrolcd\ct.exe" /svc [X] <==== ATTENTION
R0 drmkpro64; C:\WINDOWS\System32\drivers\ndistpr64.sys [78112 2013-09-28] () [File not signed] <==== ATTENTION
2017-04-15 20:53 - 2017-04-16 01:57 - 00000000 ____D C:\Users\Great Turtle\AppData\Local\ntuserlitelist
2017-04-15 20:41 - 2017-04-16 23:38 - 00000000 ____D C:\Users\Great Turtle\AppData\Local\obgrolcd
2017-04-15 20:41 - 2017-04-15 20:41 - 00000000 ____D C:\Users\Great Turtle\AppData\Local\vajiquox
2017-03-24 16:22 - 2017-03-24 16:22 - 00000000 __HDC C:\ProgramData\{042448DA-1440-41DE-BC4B-7C215005F4ED}
2017-04-15 20:39 - 2017-04-15 20:39 - 0011568 _____ () C:\Users\Great Turtle\AppData\Roaming\InstallationConfiguration.xml
2017-04-15 20:39 - 2017-04-15 20:39 - 0140288 _____ () C:\Users\Great Turtle\AppData\Roaming\Installer.dat
2017-04-15 20:36 - 2017-04-15 20:36 - 0014336 _____ () C:\Users\Great Turtle\AppData\Local\peidso.dll
2017-04-15 20:36 - 2017-04-15 20:36 - 0002048 _____ () C:\Users\Great Turtle\AppData\Local\uninstallro.exe
2016-12-10 22:39 - 2016-12-10 22:39 - 0000000 ____H () C:\ProgramData\DP45977C.lfl
2016-12-24 14:00 - 2016-12-24 14:00 - 0000016 _____ () C:\ProgramData\mntemp
2016-12-24 14:00 - 2016-12-24 14:00 - 0004156 _____ () C:\ProgramData\nakuvtjg.ewu
2017-02-11 17:01 - 2017-02-11 17:01 - 0000032 _____ () C:\ProgramData\Temp.log
2016-04-25 16:20 - 2016-04-25 16:21 - 0000106 _____ () C:\ProgramData\{2A87D48D-3FDF-41fd-97CD-A1E370EFFFE2}.log
2016-04-25 16:25 - 2016-04-25 16:25 - 0000105 _____ () C:\ProgramData\{32C8E300-BDB4-4398-92C2-E9B7D8A233DB}.log
2016-04-25 16:24 - 2016-04-25 16:24 - 0000100 _____ () C:\ProgramData\{6BADCD73-E925-46F7-A295-FF2448632728}.log
2016-04-25 16:25 - 2016-04-25 16:25 - 0000098 _____ () C:\ProgramData\{CEF5334F-B91A-4327-ACAE-AA50DCE3F995}.log
2017-04-16 07:07 - 2017-04-16 07:07 - 3516080 _____ (Enigma Software Group USA, LLC.) C:\Users\Great Turtle\AppData\Local\Temp\esgsetup.exe
2017-04-15 20:35 - 2017-04-15 20:35 - 0028672 _____ (Western Visayas College of Science and TechnologyT) C:\Users\Great Turtle\AppData\Local\Temp\fox.exe
Task: {08525713-2AAF-4318-851B-A61A0C28AC9A} - System32\Tasks\GEN => C:\Users\Great Turtle\AppData\Local\Programs\GEN\GEN.exe [2017-02-11] (                                                            ) <==== ATTENTION
Task: {32A785A5-C12E-45F1-BE4A-7EB459027950} - \IntelWiDi-Upgrade-91ba0caa-28a7-4f47-8d08-f71b4b10fbec -> No File <==== ATTENTION
Task: {5B256BD2-0557-4108-A595-311614604FAA} - \IntelWiDi-Upgrade-91ba0caa-28a7-4f47-8d08-f71b4b10fbec-Logon -> No File <==== ATTENTION
Task: {688E99C8-E2D5-40B4-8F65-2D900A74AB9C} - System32\Tasks\PasswordBoss_Desktop_HealthChk_ANTARES_Great Turtle => C:\Program Files (x86)\PasswordBoss\PasswordBoss.exe  <==== ATTENTION
Task: {6C2F95D7-D45C-48FD-99A7-6833A5E619A5} - System32\Tasks\Online Application V2G3 => C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe [2017-02-07] (Microleaves LTD) <==== ATTENTION
Task: {7C66C32F-612C-4F5F-BC47-E95585FF61AF} - System32\Tasks\PasswordBoss_Desktop_24h_ANTARES_Great Turtle => C:\Program Files (x86)\PasswordBoss\PasswordBoss.exe  <==== ATTENTION
Task: {936D6494-568D-42C3-B10E-74A1AE7DD7BA} - \Dell SupportAssistAgent AutoUpdate -> No File <==== ATTENTION
Task: {A214170D-4DD2-452D-A25D-26D73C2C7AFF} - System32\Tasks\Online Application V2G2 => C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe [2017-02-07] (Microleaves LTD) <==== ATTENTION
Task: {A86754B1-2DEA-47AE-BAAB-422F7EAD5675} - System32\Tasks\PC Health Advisor Update => C:\Program Files (x86)\ParetoLogic\PCHA\PCHA.exe  <==== ATTENTION
Task: {BC3920C8-30A3-44E4-A2D7-B1912D35D45D} - System32\Tasks\GEN_Interval => C:\Users\Great Turtle\AppData\Local\Programs\GEN\GEN.exe [2017-02-11] (                                                            ) <==== ATTENTION
Task: {D03E5FBB-9C62-47F1-8FD5-E3A44668F934} - \Intel\Intel Telemetry 2 -> No File <==== ATTENTION
Task: {F17118CD-4EDD-449B-BCC8-0FD1C472C916} - System32\Tasks\Online Application V2G1 => C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe [2017-02-07] (Microleaves LTD) <==== ATTENTION
Task: C:\WINDOWS\Tasks\Online Application V2G1.job => C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe <==== ATTENTION
Task: C:\WINDOWS\Tasks\Online Application V2G2.job => C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe <==== ATTENTION
Task: C:\WINDOWS\Tasks\Online Application V2G3.job => C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe <==== ATTENTION
Task: C:\WINDOWS\Tasks\PC Health Advisor Update.job => C:\Program Files (x86)\ParetoLogic\PCHA\PCHA.exe <==== ATTENTION
C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe
C:\Users\Great Turtle\AppData\Local\ntuserlitelist
C:\Users\Great Turtle\AppData\Local\vajiquox\qdcomsvc.exe
C:\Users\Great Turtle\AppData\Local\vajiquox
Reg: reg delete "HKEY_LOCAL_MACHINE\SYSTEM\CONTROLSET001\SERVICES\DATAUP" /f
Reg: reg delete "HKEY_LOCAL_MACHINE\SYSTEM\CONTROLSET001\SERVICES\DRMKPRO64" /f
Reboot:

Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

0

Share this post


Link to post
Share on other sites

Both ADWCleaner and JRT Removal Tool were both rejected at installation, "The Requested Resource is in Use."

0

Share this post


Link to post
Share on other sites

Do the FRST fix and the runAdwClear and JRT.

0

Share this post


Link to post
Share on other sites

copied the code to a fixlist file

ran the fix option on the FRST tool. the log is attached.  Tool ran continuously for 6 hrs.

programs AWD and JRT still refuse to load.  "requested resource in use"

 

 

 

 

Fixlog.txt

0

Share this post


Link to post
Share on other sites

Antares,

Copy the lines of code in the code box only.  You copied and pasted the entire post to  fixlist.tx, that is going to fail and could quite possibly result in an undesired outcome.

0

Share this post


Link to post
Share on other sites

Just so I am  understanding you correctly, On the code page I copy the code only and not the words Close Processes at the beginning and the words Reboot at the end. Those lines are excluded form the Fixlist.  Copy everything in between those words.  .About how long  should the operation run once fix is initiated?

0

Share this post


Link to post
Share on other sites

You copy everything in the code box, including the Close  Processes and Reboot lines.

0

Share this post


Link to post
Share on other sites

 

 

 

 

 

 

 

Things are now turning worse.  Before running FRST II wanted to generate a fresh report which is attached.  Then your program crashed and upon reinstallation I got the following "cannot create bin64\epp.sys", so I downloaded a fresh copy but upon installation got the same error message.  Something has gone wrong and I don't know how to correct it.

 

 

 

 

 

 

 

 

 

 

 

scan_170424-210249.txt

scan_170424-220942.txt

0

Share this post


Link to post
Share on other sites

The malware is interfering with our software.  You need to run the FRST fixlist I posted earlier.  It should disable the malware.

0

Share this post


Link to post
Share on other sites

Since there is often confusion in emails I am going to list step by step what I did.

1.  I went into the fix log folder and removed all previous scans.

2,  I scanned with frst and copied to desktop.

3.  I copied your code beginning with "Close processes" and ending and including "reboot"

4,  I titled this fixlist and placed it in the same folder with the two scan pages (frst & addition) and on the desktop.

5.  I then ran Fix and waited 1 hr.  Nothing happened.

6.  I did another scan with frst to see if there were any changes.  There were none.  Apparently Frst Fix option is being prevented from overwriting the operating system  with your corrections.

7.  I then went inside C drive to find your ECC folder and ran a scan from there since your program will no longer install.  "Cannot create Bin64\epp.sys"

8.  Emsisoft scan indicated that the problem is getting worse with new additions to the list.  Where there were 8 items there are now 16.

9.  All files scans are attached.

note -1 and -1a are renamed filed from the first scan by frst.

10.  I just took a look at the fixlist file and it doesn't look at all like your code which I copied exactly from the email.  Somehow when I copy and paste it, it gets changed into what you see.  Your code for some reason isn't coping the way you wrote it.  I highlighted only what was written in the code box.  Is there another way to copy/paste the code other than to write it out longhand.  This is probably where the problem lies in coping the code.

 

will no longer install since it cannot create "bin64\sys"

FRST_26-04-2017 23.48.49.txt

Addition_26-04-2017 23.48.49.txt

-1.txt

-1a.txt

fixlist.txt

scan_170424-220942.txt

0

Share this post


Link to post
Share on other sites

Stop copying the entire post that contains the FRST fixlist data. That only puts a bunch of HTML code in the text file, that is not supposed to be there.  Only copy & paste the code lines that are in the code box.  Any other code in that file could have disastrous results, and result in catastrophic system failure.

0

Share this post


Link to post
Share on other sites

That is exactly what I did.  I copied only the lines from Close Processes down through Reboot but Windows 10 copies the whole thing and not just the highlighted area.  I guess I shall have to copy it by hand since Copy and Paste don't seem to work as normal.

0

Share this post


Link to post
Share on other sites

Then there should not be any HTML code being copied.  What browser are you using?

0

Share this post


Link to post
Share on other sites

I finally got the code copied exactly as written.  Checked it against a printout.  Seems some of it was off the screen and didn't get copied.

The computer was rescanned and removing any previous dates so that there was only today's scan present.  Fixlist was then attached to the folder and desktop.  It is now running.  About how long should this run before I think something has gone wrong?

Browser is Firefox 53.

UPDATE ON FIX PROCEEDURE

However, the results are not favorable.  Apparently this malware keeps FRST from using the FIX option to rewrite the HDD.  Nothing has changed and this time I got it right with your code page.  See attached files.

I am beginning to suspect that this problem is not fixable and that the only alternative it to replace the HDD.  If you see something I missed or have additional options please post them.  So far all attempts to remove this infection have failed.

FRST_27-04-2017 22.13.27.txt

Addition_27-04-2017 22.13.27.txt

fixlist.txt

0

Share this post


Link to post
Share on other sites

OK,

Restart to Safe Mode and try running the FRST fix.  If it runs successfully attach the fixlog, generated by FRST, to your reply.

If that fails then you will need manually remove the infection from within the Windows Recovery Environment.

See the Bleeping Computer article on SmartService. https://www.bleepingcomputer.com/news/security/smartservice-acts-like-an-adware-bodyguard-by-blocking-antivirus-software/

0

Share this post


Link to post
Share on other sites

Results of Safe Mode run.  No change that I can see.  Fixlog attached.

The advice offered in the article is no longer valid.  All avenues suggested by the article are now being blocked

Restore Reset on Windows Recovery Environment is likewise blocked from running.

Windows reinstall file from Microsoft is also blocked.

A new HDD seems to be the only way out

Fixlog.txt

0

Share this post


Link to post
Share on other sites

Let's give this a try and if that does not work, then there is one more thing we can try.

Download RogueKiller from one of the following links and save it to your desktop:

  • Link 1
  • Link 2
    • Close all programs and disconnect any USB or external drives before running the tool.
    • Double-click RogueKiller.exe to run the tool (Vista/7/8/10 users: Right-click and select Run As Administrator).
    • Once the Prescan has finished, click Scan.
    • Once the Status box shows "Scan Finished", click on the "Report" button and attach the scan log to your reply.


0

Share this post


Link to post
Share on other sites

From Safe Mode:

Close all programs and disconnect any USB or external drives before running the tool.

  • Double-click RogueKiller.exe to run the tool again (Vista/7/8/10 users: Right-click and select Run As Administrator)[/i].)[/i].)[/i].
  • Once the Prescan has finished, click Scan.
  • Once the Status box shows "Scan Finished".
    • Click the Processes Tab and select the following items:
      [Adw.Yelloader|Suspicious.Path|VT.Adware.Yelloader] dataup.exe(2972) -- C:\Users\Great Turtle\AppData\Local\ntuserlitelist\dataup\dataup.exe[-] -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] Online-Guardian.exe(5404) -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe[7] -> Found
      [Adw.Yelloader|Suspicious.Path|VT.Adware.Yelloader] svcvmx.exe(12720) -- C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe[-] -> Found
      [Adw.Yelloader|Suspicious.Path|VT.HEUR:Trojan.Win32.Generic] vmxclient.exe(11856) -- C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe[-] -> Found
      [Adw.Yelloader|Suspicious.Path|VT.HEUR:Trojan.Win32.Generic] vmxclient.exe(6872) -- C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe[-] -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] Online-Guardian.exe(11384) -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe[7] -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] Online-Guardian.exe(2912) -- C:\Program Files (x86)\Microleaves\Online Special Application\Version 2.6.0\Online-Guardian.exe[7] -> Found
      [Adw.Yelloader|Suspicious.Path|VT.HEUR:Trojan.Win32.Generic] vmxclient.exe(11648) -- C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe[-] -> Found
      [Adw.Yelloader|Suspicious.Path|VT.HEUR:Trojan.Win32.Generic] vmxclient.exe(7276) -- C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe[-] -> Found
      [Adw.Yelloader|Suspicious.Path|VT.HEUR:Trojan.Win32.Generic] vmxclient.exe(1892) -- C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\vmxclient.exe[-] -> Found
      [PUP.Gen0|VT.Adware.Yelloader] (SVC) Dataup -- C:\Users\GREATT~1\AppData\Local\NTUSER~1\dataup\dataup.exe[-] -> Found
    • Click the Registry Tab and select the following items:
      [PUP.Gen0] (X64) HKEY_CLASSES_ROOT\CLSID\{4ABDD67C-44E3-42E0-816D-D7F0E54761DF} (C:\Program Files\BDServices\BDUpdateServiceCom.dll) -> Found
      [PUP.Gen0] (X64) HKEY_CLASSES_ROOT\CLSID\{65416821-217D-44BD-9C61-F53398FB1B46} (C:\Program Files\BDServices\scan.dll) -> Found
      [PUP.Gen0] (X64) HKEY_CLASSES_ROOT\CLSID\{94915A56-4D71-4F85-B59C-CC040F5AC6F0} (C:\Program Files\BDServices\BDUpdateServiceCom.dll) -> Found
      [PUP.OnlineIO] (X86) HKEY_LOCAL_MACHINE\Software\Microleaves -> Found
      [PUP.Gen1] (X86) HKEY_LOCAL_MACHINE\Software\PPC-software -> Found
      [PUP.Gen1] (X86) HKEY_LOCAL_MACHINE\Software\Uniblue -> Found
      [PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\PPC-softwareLanguage -> Found
      [PUP.SwytShop] (X64) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\SwytShop -> Found
      [PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\Trymedia Systems -> Found
      [PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\PPC-softwareLanguage -> Found
      [PUP.SwytShop] (X86) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\SwytShop -> Found
      [PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\Trymedia Systems -> Found
      [PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\AppDataLow\Software\adawarebp -> Found
      [PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\AppDataLow\Software\adawarebp -> Found
      [PUP.Spoutly|PUP.Gen1] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall\{730E03E4-350E-48E5-9D3E-4329903D454D} -> Found
      [PUP.OnlineIO|PUP.Gen1] (X64) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall\AnonymizerGadget -> Found
      [PUP.OnlineIO|PUP.Gen1] (X86) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\Microsoft\Windows\CurrentVersion\Uninstall\AnonymizerGadget -> Found
      [Adw.Yelloader|Suspicious.Path|VT.Adware.Yelloader] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | svcvmx : "C:\Users\Great Turtle\AppData\Local\ntuserlitelist\svcvmx\svcvmx.exe" -starup [-] -> Found
      [PUP.Gen0|Adw.Yelloader|Suspicious.Path|VT.Adware.Yelloader] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Dataup (C:\Users\GREATT~1\AppData\Local\NTUSER~1\dataup\dataup.exe) -> Found
      [PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.startpage.com/  -> Found
      [PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-2847586871-285742337-784558086-1001\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.startpage.com/  -> Found
    • Click the Tasks Tab and select the following items:
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] %WINDIR%\Tasks\Online Application V2G1.job -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe (1 69) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] %WINDIR%\Tasks\Online Application V2G2.job -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe (1 70) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] %WINDIR%\Tasks\Online Application V2G3.job -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe (1 71) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] %WINDIR%\Tasks\Online Special Application V2G1.job -- C:\Program Files (x86)\Microleaves\Online Special Application\Version 2.6.0\Online-Guardian.exe (1 69) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] %WINDIR%\Tasks\Online Special Application V2G2.job -- C:\Program Files (x86)\Microleaves\Online Special Application\Version 2.6.0\Online-Guardian.exe (1 70) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] %WINDIR%\Tasks\Online Special Application V2G3.job -- C:\Program Files (x86)\Microleaves\Online Special Application\Version 2.6.0\Online-Guardian.exe (1 71) -> Found
      [PUP.Gen1] %WINDIR%\Tasks\PC Health Advisor Update.job -- C:\Program Files (x86)\ParetoLogic\PCHA\PCHA.exe (-update) -> Found
      [Suspicious.Path|VT.not-a-virus:Downloader.Win32.Bloader.am] \GEN -- C:\Users\Great Turtle\AppData\Local\Programs\GEN\GEN.exe -> Found
      [Suspicious.Path|VT.not-a-virus:Downloader.Win32.Bloader.am] \GEN_Interval -- C:\Users\Great Turtle\AppData\Local\Programs\GEN\GEN.exe (/task) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] \Online Application V2G1 -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe (1 69) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] \Online Application V2G2 -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe (1 70) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] \Online Application V2G3 -- C:\Program Files (x86)\Microleaves\Online Application\Version 2.6.0\Online-Guardian.exe (1 71) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] \Online Special Application V2G1 -- C:\Program Files (x86)\Microleaves\Online Special Application\Version 2.6.0\Online-Guardian.exe (1 69) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] \Online Special Application V2G2 -- C:\Program Files (x86)\Microleaves\Online Special Application\Version 2.6.0\Online-Guardian.exe (1 70) -> Found
      [PUP.OnlineIO|PUP.Gen0|VT.PUP.Optional.OnlineIO] \Online Special Application V2G3 -- C:\Program Files (x86)\Microleaves\Online Special Application\Version 2.6.0\Online-Guardian.exe (1 71) -> Found
      [PUP.Gen1] \PC Health Advisor Update -- C:\Program Files (x86)\ParetoLogic\PCHA\PCHA.exe (-update) -> Found
    • Click the Files Tab and select the following items:
      [PUP.OnlineIO|PUP.Gen0][Folder] C:\ProgramData\Microleaves -> Found
      [PUP.Gen1][Folder] C:\ProgramData\Uniblue -> Found
      [PUP.OnlineIO|PUP.Gen1][Folder] C:\Users\Great Turtle\AppData\Roaming\AGData -> Found
      [PUP.OnlineIO|PUP.Gen0][Folder] C:\Users\Great Turtle\AppData\Roaming\Microleaves -> Found
      [Tr.Gen0][File] C:\Users\Great Turtle\AppData\Roaming\uTorrent\updates\3.4.9_43388\utorrentie.exe -> Found
      [PUP.OnlineIO][Folder] C:\Users\Great Turtle\AppData\Local\AdvinstAnalytics -> Found
      [Adw.Yelloader][Folder] C:\Users\Great Turtle\AppData\Local\ntuserlitelist -> Found
      [Tr.Zusy][File] C:\Users\Great Turtle\AppData\Local\peidso.dll -> Found
      [PUP.OnlineIO|PUP.Gen0][Folder] C:\ProgramData\Microleaves -> Found
      [PUP.OnlineIO|PUP.Gen1][Folder] C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AnonymizerGadget -> Found
      [PUP.Gen1][Folder] C:\ProgramData\Uniblue -> Found
      [PUP.OnlineIO|PUP.Gen1][Folder] C:\Program Files (x86)\AnonymizerGadget -> Found
      [PUP.OnlineIO|PUP.Gen0][Folder] C:\Program Files (x86)\Microleaves -> Found
      [PUP.OnlineIO|PUP.Gen1][Folder] C:\Program Files (x86)\s5 -> Found
      [PUP.Gen3][File] C:\Users\Great Turtle\AppData\Roaming\Mozilla\Firefox\Profiles\1ifop3ls.default\searchplugins\yahoo-lavasoft.xml -> Found
    • Click the Web browsers Tab and select the following items:
      [PUP.Gen2][Firefox:Addon] 1ifop3ls.default : Ant Video Downloader [[email protected]] -> Found
      [PUM.NewTab][Firefox:Config] 1ifop3ls.default : user_pref("browser.newtab.url", "https://www.startpage.com/"); -> Found
      [PUM.SearchEngine][Firefox:Config] 1ifop3ls.default : user_pref("browser.search.selectedEngine", "Yahoo®"); -> Found
      [PUM.SearchEngine][Firefox:Config] 1ifop3ls.default : user_pref("browser.search.defaultenginename", "Yahoo®"); -> Found
    • Click the Delete button.
  • Attach the RogueKiller report to your next reply.
    • The log can also be found on your desktop labeled (RKreport[X]_D_xxdatexx_xtimex.txt)
    • The highest number of [X], is the most recent Delete log

If that fix runs properly, reboot the system and enter Safe Mode again and run the previous FRST fix I sent.

If that completes successfully, reboot to Normal Mode and run AdwCleaner and JRT.

0

Share this post


Link to post
Share on other sites

This is all that Rough Killer is showing which is strange case I use antvideodownloader all the time and it's never caused an issue but it is the one highlighted in red.  The program has either quarinteened or removed everything else but my cleaning programs still remained blocked.

Today run.txt

0

Share this post


Link to post
Share on other sites

That certainly is strange.

In Normal Mode:

Download avz4.zip from here

  • Unzip it to your desktop to a folder named avz4
  • Double click on AVZ.exe to run it.
  • Run an update by clicking the Auto Update button on the Right of the Log window: avz-update-button.png
  • Click Start to begin the update
    Note: If you receive an error message, chose a different source, then click Start again
  • After the update, from the "File" menu, choose "Standard Scripts"
  • Put a check next to item 2: Advanced System Analysis
  • Click Execute selected scripts
  • At the next prompt, click the OK button
  • Let the scan run and click "OK" when the completion prompt pops up
  • Now Close out of the Standard Scripts window, and exit AVZ
  • Navigate to the avz4 folder and locate the folder LOG
  • Inside the LOG folder you will find virusinfo_syscheck.htm, virusinfo_syscheck.htm and virusinfo_syscheck.zip
  • Attach the Compressed file, virusinfo_syscheck.zip, to your next reply.

0

Share this post


Link to post
Share on other sites

The AVZ scan is not showing anything from SmartService.

Run a fresh scan with FRST, attach the new FRST scan log to your reply.

0

Share this post


Link to post
Share on other sites

Most of the SmartService infection no longer appears to be present.

Copy the below code to Notepad; Save As fixlist.txt to your Desktop.

SearchScopes: HKLM -> DefaultScope value is missing
R0 drmkpro64; C:\WINDOWS\System32\drivers\ndistpr64.sys [78112 2013-09-28] () [File not signed] <==== ATTENTION
SearchScopes: HKU\S-1-5-21-2847586871-285742337-784558086-1001 -> {A34D5335-6CB4-4AA0-8F41-B9A86B54FB23} URL = 
SearchScopes: HKU\S-1-5-21-2847586871-285742337-784558086-1001 -> {C0C3A6C6-03BC-4195-8FCB-AEA091301353} URL = 
2017-04-29 07:00 - 2017-04-29 07:00 - 00002292 _____ C:\WINDOWS\System32\Tasks\{7BBFB8EC-6DC1-4F49-9C35-172671B22E0D}
2017-04-29 07:00 - 2017-04-29 07:00 - 00002264 _____ C:\WINDOWS\System32\Tasks\{494872FE-0BD3-4068-81DF-1BDC57378E3D}
2017-04-15 22:30 - 2017-04-15 22:39 - 00000000 ____D C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PasswordBoss
2017-04-15 20:41 - 2017-05-03 03:02 - 00000000 ____D C:\Users\Great Turtle\AppData\Local\vajiquox
2017-04-15 20:41 - 2017-04-16 23:38 - 00000000 ____D C:\Users\Great Turtle\AppData\Local\obgrolcd
2016-12-24 14:00 - 2016-12-24 14:00 - 0000016 _____ () C:\ProgramData\mntemp
2016-12-24 14:00 - 2016-12-24 14:00 - 0004156 _____ () C:\ProgramData\nakuvtjg.ewu
2017-02-11 17:01 - 2017-02-11 17:01 - 0000032 _____ () C:\ProgramData\Temp.log
2016-04-25 16:20 - 2016-04-25 16:21 - 0000106 _____ () C:\ProgramData\{2A87D48D-3FDF-41fd-97CD-A1E370EFFFE2}.log
2016-04-25 16:25 - 2016-04-25 16:25 - 0000105 _____ () C:\ProgramData\{32C8E300-BDB4-4398-92C2-E9B7D8A233DB}.log
2016-04-25 16:24 - 2016-04-25 16:24 - 0000100 _____ () C:\ProgramData\{6BADCD73-E925-46F7-A295-FF2448632728}.log
2016-04-25 16:25 - 2016-04-25 16:25 - 0000098 _____ () C:\ProgramData\{CEF5334F-B91A-4327-ACAE-AA50DCE3F995}.log
2017-05-01 22:01 - 2017-03-18 16:57 - 1930320 _____ (Microsoft Corporation) C:\Users\Great Turtle\AppData\Local\Temp\dllnt_dump.dll
2017-05-01 19:26 - 2017-05-01 19:28 - 3516080 _____ (Enigma Software Group USA, LLC.) C:\Users\Great Turtle\AppData\Local\Temp\esgsetup.exe
Task: {688E99C8-E2D5-40B4-8F65-2D900A74AB9C} - System32\Tasks\PasswordBoss_Desktop_HealthChk_ANTARES_Great Turtle => C:\Program Files (x86)\PasswordBoss\PasswordBoss.exe  <==== ATTENTION
Task: {7C66C32F-612C-4F5F-BC47-E95585FF61AF} - System32\Tasks\PasswordBoss_Desktop_24h_ANTARES_Great Turtle => C:\Program Files (x86)\PasswordBoss\PasswordBoss.exe  <==== ATTENTION
C:\WINDOWS\System32\drivers\ndistpr64.sys
C:\Program Files (x86)\PasswordBoss\PasswordBoss.exe
C:\Program Files (x86)\PasswordBoss

Close Notepad.

NOTE: It's important that both files, FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST64 and press the Fix button just once and wait.

If the tool needed a restart please make sure you let the system restart normally and let the tool complete its run after restart.

The tool will make a log on the Desktop (Fixlog.txt). Attach it to your reply.

Note: If the tool warns you about an outdated version please download and run the updated version.

0

Share this post


Link to post
Share on other sites

Fixlist applied and ran within a few seconds follwoed by a reboot.  However when I went to run JRT or Adwarecleaner, the result was the same..Resource is in use" software blocked.  A friend of mine says there must be a driver hidden somewhere that is triggering this and we can't find it by the means used.  Fixlist log attached

Fixlog.txt

0

Share this post


Link to post
Share on other sites

Correct me jf I am wrong but I think I got a big clue last night.  I was able to zemana Anti-malware to run for a brief few seconds before it was terminated.  Zemana software told me that I  was infected by a rootkit "WINNT/AdClicker....driver....ndistpr64.sys.  If this is so what is the safe way to deal with it.

0

Share this post


Link to post
Share on other sites

Moving discussion to Private Message.

Thread closed.

0

Share this post


Link to post
Share on other sites
Guest
This topic is now closed to further replies.

  • Recently Browsing   0 members

    No registered users viewing this page.