My computer was running slowly for a alienware so I ran a full computer scan with avast and all comes out clean. So I then ran MBAM and nothing. I went to load up roguekiller (adlice) and would not allow me saying something about my security in the internet options won’t allow it so I went and looked at the security setting and seen something had changed it to customs. I changed it back to defaults and is good so far and it allowed me to run roguekiller (adlice) and found some suspicious items. SO I would like someone to take a look at the results and tell me what to get rid of. Under processes it does come up curserclient.exe I think, witch I do have a program for downloading addons for world of warcraft but I do know virus’s can duplicate other files to hide or fool.
follow instructions here https://forum.avast.com/index.php?topic=53253.0
scroll down to Farbar Recovery Scan Tool … run as instructed and attach the two diagnostic logs
also attach rougkiller log
a malware expert will review your logs later today…
RogueKiller V10.1.0.0 (x64) [Dec 11 2014] by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/softwares/roguekiller/
Blog : http://www.adlice.com
Operating System : Windows 7 (6.1.7601 Service Pack 1) 64 bits version
Started in : Normal mode
User : orrie [Administrator]
Mode : Scan – Date : 12/22/2014 07:17:29
¤¤¤ Processes : 1 ¤¤¤
[Suspicious.Path] CurseClient.exe – C:\Users\orrie\AppData\Local\Apps\2.0\C962K2EX.6BX\N60YOXW5.CWX\curs…tion_9e9e83ddf3ed3ead_0005.0001_36a9b62a0ea0a2ec\CurseClient.exe[-] → Killed [TermProc]
¤¤¤ Registry : 18 ¤¤¤
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BRDriver64 (??\C:\ProgramData\BitRaider\BRDriver64.sys) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BRDriver64_1_3_3_E02B25FC (??\C:\ProgramData\BitRaider\support\1.3.3\E02B25FC\BRDriver64.sys) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BRSptStub (“C:\ProgramData\BitRaider\BRSptStub.exe”) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\BRSptSvc (“C:\ProgramData\BitRaider\BRSptSvc.exe”) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\BRDriver64 (??\C:\ProgramData\BitRaider\BRDriver64.sys) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\BRDriver64_1_3_3_E02B25FC (??\C:\ProgramData\BitRaider\support\1.3.3\E02B25FC\BRDriver64.sys) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\BRSptStub (“C:\ProgramData\BitRaider\BRSptStub.exe”) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\BRSptSvc (“C:\ProgramData\BitRaider\BRSptSvc.exe”) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\BRDriver64 (??\C:\ProgramData\BitRaider\BRDriver64.sys) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\BRDriver64_1_3_3_E02B25FC (??\C:\ProgramData\BitRaider\support\1.3.3\E02B25FC\BRDriver64.sys) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\BRSptStub (“C:\ProgramData\BitRaider\BRSptStub.exe”) → Found
[Suspicious.Path] (X64) HKEY_LOCAL_MACHINE\System\ControlSet002\Services\BRSptSvc (“C:\ProgramData\BitRaider\BRSptSvc.exe”) → Found
[PUM.HomePage] (X64) HKEY_USERS\S-1-5-21-4265760993-2958726479-831690328-1002\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.facebook.com/ → Found
[PUM.HomePage] (X86) HKEY_USERS\S-1-5-21-4265760993-2958726479-831690328-1002\Software\Microsoft\Internet Explorer\Main | Start Page : https://www.facebook.com/ → Found
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 → Found
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 → Found
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1 → Found
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1 → Found
¤¤¤ Tasks : 0 ¤¤¤
¤¤¤ Files : 0 ¤¤¤
¤¤¤ Hosts File : 1 ¤¤¤
[C:\Windows\System32\drivers\etc\hosts] 127.0.0.1 localhost
¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤
¤¤¤ Web browsers : 0 ¤¤¤
¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: WDC WD10EZEX-75ZF5A0 ATA Device +++++
— User —
[MBR] 1005ac7aff5720d4f55ad2f3c3addcb5
[BSP] 71d029494545b00594942e59c9c26c6e : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x0) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 … OK
User = LL2 … OK
============================================
RKreport_DEL_12212014_111347.log - RKreport_DEL_12212014_112112.log - RKreport_SCN_12212014_111159.log - RKreport_SCN_12212014_111559.log
RKreport_SCN_12212014_113017.log
we are still wating for FRST logs … they are big so must be attached, not copy and paste
below the txt box you write in you find Attachments and other options
Monitoring.
i went there to download the programs to get the logs i notice the site is from bleepingcomputer.com i think, and was wondering if that site is safe befor i download it. Pretty sure i have been there in the past for something and had a virus protector pop up. not sure if i have Norton or avast at the time. srry for asking just trying to be safe
i went there to download the programs to get the logs i notice the site is from bleepingcomputer.com i think, and was wondering if that site is safe befor i download it.yes it is safe, we only use safe links / tools .... they are used here evry day, multiple times
bleepingcomputer is a very known help forum for malware removal
however, since it is a help forum for malware, malicious code may have been posted for display there and a AV may react on that, sometimes happens here also
also, all the malware tools used are frequently detected by AV, especially after a update
kk give me like 15-25 min as I am fixing dinner for me and my mom. oh ya 1 more thing is I have another computer in the house witch is my mom’s. She plays online games from like Iwin game and more witch I don’t trust them at all being safe. One of them I found out was unsafe and she got a virus from it( wich was taken care of) but since she does a good chance I got it from her but not a def thing. So my question to u all is should I do the same for her computer too. Kinda like perging my intranet or home network?
So my question to u all is should I do the same for her computer too.you may do that when this is done ..... anyway Valinorum is the one that will work your case when online again, so you may ask him
...my question to u all is should I do the same for her computer too. Kinda like perging my intranet or home network?Let's clean your current machine first and we will move on to your mom's machine afterwards.
sorry for being so late on this but im ready to get this fixed
[*]Step #1 Fix with FRST
Make sure that you still have FRST.exe on your Desktop. If you do not have it, download the suitable version from here to your Desktop.
[*]Open Notepad.exe. Do not use any other text editor software;
[*]Copy and Paste the contents inside the code-box to your Notepad –
Start
CreateRestorePoint:
Closeprocesses:
Emptytemp:
AlternateDataStreams: C:\ProgramData\TEMP:059167AF
AlternateDataStreams: C:\ProgramData\TEMP:0AC32449
AlternateDataStreams: C:\ProgramData\TEMP:1ECED34B
AlternateDataStreams: C:\ProgramData\TEMP:217A2A36
AlternateDataStreams: C:\ProgramData\TEMP:21D69AEA
AlternateDataStreams: C:\ProgramData\TEMP:2216A431
AlternateDataStreams: C:\ProgramData\TEMP:29C0641D
AlternateDataStreams: C:\ProgramData\TEMP:38FF076E
AlternateDataStreams: C:\ProgramData\TEMP:3B07E6F4
AlternateDataStreams: C:\ProgramData\TEMP:3D67D093
AlternateDataStreams: C:\ProgramData\TEMP:49F896E9
AlternateDataStreams: C:\ProgramData\TEMP:568D4797
AlternateDataStreams: C:\ProgramData\TEMP:5C4A588B
AlternateDataStreams: C:\ProgramData\TEMP:6B709AD7
AlternateDataStreams: C:\ProgramData\TEMP:7E4E56EA
AlternateDataStreams: C:\ProgramData\TEMP:80E965A3
AlternateDataStreams: C:\ProgramData\TEMP:84FA02E7
AlternateDataStreams: C:\ProgramData\TEMP:95198126
AlternateDataStreams: C:\ProgramData\TEMP:99AC3203
AlternateDataStreams: C:\ProgramData\TEMP:9CF728A6
AlternateDataStreams: C:\ProgramData\TEMP:9D03192E
AlternateDataStreams: C:\ProgramData\TEMP:A6B07419
AlternateDataStreams: C:\ProgramData\TEMP:A9ABA3FF
AlternateDataStreams: C:\ProgramData\TEMP:AE289451
AlternateDataStreams: C:\ProgramData\TEMP:BA24E689
AlternateDataStreams: C:\ProgramData\TEMP:BDF08FAF
AlternateDataStreams: C:\ProgramData\TEMP:BEE39E9B
AlternateDataStreams: C:\ProgramData\TEMP:C9B27A06
AlternateDataStreams: C:\ProgramData\TEMP:CC7382F6
AlternateDataStreams: C:\ProgramData\TEMP:D2397415
AlternateDataStreams: C:\ProgramData\TEMP:D31BE97C
AlternateDataStreams: C:\ProgramData\TEMP:D3A89E47
AlternateDataStreams: C:\ProgramData\TEMP:D6D084A5
AlternateDataStreams: C:\ProgramData\TEMP:DA18D4E3
AlternateDataStreams: C:\ProgramData\TEMP:DCA79AB3
AlternateDataStreams: C:\ProgramData\TEMP:E2B84483
AlternateDataStreams: C:\ProgramData\TEMP:E5BA9ADD
AlternateDataStreams: C:\ProgramData\TEMP:E6537A16
AlternateDataStreams: C:\ProgramData\TEMP:F878F14A
AlternateDataStreams: C:\ProgramData\TEMP:F98E6C67
HKLM\...\Run: [] => [X]
HKU\S-1-5-21-4265760993-2958726479-831690328-1002\...\MountPoints2: {e48bb115-17f6-11e3-97ae-d4bed9fd263b} - D:\Autorun.exe /s
HKU\S-1-5-21-4265760993-2958726479-831690328-1002\...A8F59079A8D5}\localserver32: <==== ATTENTION!
SearchScopes: HKLM -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKLM-x32 -> {0633EE93-D776-472f-A0FF-E1416B8B2E3A} URL =
SearchScopes: HKU\S-1-5-21-4265760993-2958726479-831690328-1002 -> DefaultScope {AC0BA77E-DBDD-4E1C-8501-4ED5E1CABD39} URL =
SearchScopes: HKU\S-1-5-21-4265760993-2958726479-831690328-1002 -> {AC0BA77E-DBDD-4E1C-8501-4ED5E1CABD39} URL =
CMD: ipconfig /flushdns
End
[*]Click on File > Save as…
[list][*]Inside the File Name box type fixlist.txt
[*]From the Save as type drop down list, choose All Files
[*]Save the file to your Desktop;
[*]Re-run FRST.exe and click Fix;
[*]Note: If FRST advises there is a new updated version to be downloaded, do so/allow this.[]After the completion, a log will be produced;
[]Attach the log in your next reply.[/list]
[*]Required Log(s):
[*]FRST Fix Log
Regards,
Valinorum
ty for being patient with me
How is your PC?
seems to be ok so far
Perusing your logs, I see no infection currently present in your system. Unless you are having any issue(s), the machine appears to be Malware-free as we speak.
Removal of Tools and Quarantined Files
Despite the tools we have used are clean, they are powerful removal tools and made in a way so that they carry out any commands given to them without (most cases) asking for a confirmation. In the hands of an inept person, they can make the machine un-bootable – a scenario we do not wish to see. Also, we need to remove the quarantined files/folders from your system as a dormant malware can be as bad as an active one if given the proper environment. I shall now give you the guidelines to remove the tools and the quarantined files from your system.
[*]Cleanup with Delfix
Please download DelFix by Xplode to your Desktop.
Download Link
[*]Double-click to run the program;
[list][*]Note: Windows Vista/7/8 users right-click and choose Run as administrator[*]Make sure that all the boxes are checked;
[*]Click Run;
[*]A log will be opened after the operation is finished;
[*]Copy and Paste it in your next reply[/list]
Prevention and Future Guidelines
Prevention is better than cure – goes the old saying. As much as we love to see you visit our site, we do not want to see you having your PC infected by malwares again.
[*]Keep Windows up-to-date.
It is extremely important that you keep your operating system (Windows) updated when updates are made available. It is set to alert you, so be sure not to ignore these notices and to allow the updates to install. Many of these are critical security packages which could very possibly be the difference between your picking up a future infiltration and simply passing right by it unharmed.
[*]Run antivirus software and keep it up-to-date, too.
Antivirus software is your safety net if all other protections fail. The first line of defense is smart computing, of course, but everyone needs a backup. Once they’re installed, check periodically to ensure they have been successfully updating as well. An out-of-date antivirus is not a happy antivirus!
[*]Keep your web browser plugins and other programs updated also.
This tip is rarely shared by technicians and its importance is not widely recognized, but it’s absolutely critical. Programs such as Java, Adobe Flash Player and Adobe Reader, Internet Explorer, and myriad other such web-exposed items are deeply vulnerable to attack, which can quickly lead to a hopelessly infected system no matter what protection you currently have installed. The reason is that these programs are ubiquitous, but are also not perfect and are extremely complex… and as such, security vulnerabilities are discovered and exploited by hackers hoping to gain control over your machine. By performing every update for these programs as soon as it’s made available, you will greatly reduce your exposure to dangerous internet threats.
A great way to do this is to install the Filehippo Update Checker and run it regularly. Also, try not to ignore any notifications you receive regarding updates to programs already installed on your PC.
No scripts is an excellent security device too. I like it but it is not for everyone because it requires you to take action if you want to see some things (pop ups, banners etc.) on sites you visit.
Download NoSript by Giorgio Maone.
Note: Sometimes you will get a site telling you that you need to install Java when actually all you need to do is enable the site through the no script icon down on the right hand side of your computer.
[*]Watch out for new threat named CryptoLocker
CryptoLocker is a new type ransomware family malware that encrypts your important files and asks for a ransom to decrypt them. At the moment of posting this reply there are no tools that can undo the havoc this malware causes. We can help you to remove the malware from your system but the files that was encrypted cannot be recovered without the decryption key. So, I ask for your forbearance and practice constant vigilance. Please read the following article to acknowledge yourself about the safety measures.
How to prevent your computer from becoming infected by CryptoLocker.
[*]And last of all, surf smart.
It doesn’t matter how well the autopilot system works if the pilot keeps flying the plane into mountain ranges. Don’t forget that no matter how much you have protecting yourself, your security ultimately begins and ends with you. Don’t visit dangerous or questionable web sites, avoid suspicious links on Facebook and emails/email attachments you’re unsure about, and just generally keep your wits about you, and you’ll be much safer. Also, avoid illegal downloads, cracks, “warez”, and all other too-good-to-be-true internet offerings: they’re typically laden with malware. Be smart and you can avoid most threats lurking about the darker corners of the internet! And for even more tips, see our article, How Did I Get Infected in the First Place?
My help is free but if you feel like making my day you may donate any amount you wish by clicking the ‘donate’ button. I really appreciate your kindness.
https://www.paypalobjects.com/en_US/i/btn/btn_donate_SM.gif
Regards,
Valinorum
I tried to run the delfix but I get a app error pop up
Which error does it show?
exception EAccessviolation in module erunt.exe at 00003A3E. access violation at address 0040A3E in module ERUNT.EXE. write of address 0076005D
but I still have the cleaning window up says cleaning windows restore