Page 2 of 2 FirstFirst 12
Results 11 to 17 of 17

Thread: Im back: Kids are good for something!!!

  1. #11
    Junior Member
    Join Date
    Jun 2013
    Posts
    11

    Default

    RogueKiller V8.6.2 [Jul 5 2013] by Tigzy
    mail : tigzyRK<at>gmail<dot>com
    Feedback : http://www.adlice.com/forum/
    Website : http://www.adlice.com/softwares/roguekiller/
    Blog : http://tigzyrk.blogspot.com/

    Operating System : Windows Vista (6.0.6002 Service Pack 2) 32 bits version
    Started in : Normal mode
    User : David & Amber Watts [Admin rights]
    Mode : Scan -- Date : 07/09/2013 20:23:17
    | ARK || FAK || MBR |

    ¤¤¤ Bad processes : 1 ¤¤¤
    [SUSP PATH] wdcbg.exe -- C:\Windows\wdcbg.exe [-] -> KILLED [TermProc]

    ¤¤¤ Registry Entries : 5 ¤¤¤
    [RUN][SUSP PATH] HKLM\[...]\Run : WDCBG (C:\Windows\WDCBG.EXE [-]) -> FOUND
    [HJ POL] HKCU\[...]\System : DisableTaskMgr (0) -> FOUND
    [HJ POL] HKCU\[...]\System : DisableRegistryTools (0) -> FOUND
    [HJ DESK] HKLM\[...]\NewStartPanel : {59031a47-3f72-44a7-89c5-5595fe6b30ee} (1) -> FOUND
    [HJ DESK] HKLM\[...]\NewStartPanel : {20D04FE0-3AEA-1069-A2D8-08002B30309D} (1) -> FOUND

    ¤¤¤ Scheduled tasks : 0 ¤¤¤

    ¤¤¤ Startup Entries : 0 ¤¤¤

    ¤¤¤ Web browsers : 0 ¤¤¤

    ¤¤¤ Particular Files / Folders: ¤¤¤

    ¤¤¤ Driver : [LOADED] ¤¤¤

    ¤¤¤ External Hives: ¤¤¤

    ¤¤¤ Infection : ¤¤¤

    ¤¤¤ HOSTS File: ¤¤¤
    --> %SystemRoot%\System32\drivers\etc\hosts


    127.0.0.1 localhost
    ::1 localhost


    ¤¤¤ MBR Check: ¤¤¤

    +++++ PhysicalDrive0: WDC WD64 00AAKS-65A7B SCSI Disk Device +++++
    --- User ---
    [MBR] b0734df7b58f2931365f0c686f0355a0
    [BSP] cbe1a3892920c024e3e7b9efc684338e : MBR Code unknown
    Partition table:
    0 - [ACTIVE] NTFS (0x07) [VISIBLE] Offset (sectors): 63 | Size: 600915 Mo
    1 - [XXXXXX] NTFS (0x07) [VISIBLE] Offset (sectors): 1230675390 | Size: 9562 Mo
    User = LL1 ... OK!
    Error reading LL2 MBR!

    Finished : << RKreport[0]_S_07092013_202317.txt >>

  2. #12
    Junior Member
    Join Date
    Jun 2013
    Posts
    11

    Default

    also

    I tried jrt and dds and same issue. Dds gets to registry then disappears.

  3. #13
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    Lets move on. Cant tell if you have this or not, if not: Lets see if it can dig up anything. JRT and Roguekiller are somewhat limited in what they can remove.

    Please download the free version of Malwarebytes to your desktop.

    Double-click mbam-setup.exe and follow the prompts to install the program.

    Be sure a checkmark is placed next to Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware, then click Finish.

    If an update is found, it will download and install the latest version.

    Once the program has loaded, select Perform FULL SCAN, then click Scan.
    When the scan is complete, click OK, then Show Results to view the results.

    Be sure that everything is checked, and click *Remove Selected.*

    *A restart of your computer may be required to remove some items. If prompted please restart your computer to complete the fix.*

    When completed, a log will open in Notepad. Please save it to a convenient location. The log can also be opened by going to Start > All Programs > Malwarebytes' Anti-Malware > Logs > log-date.txt
    Post the log in your reply.
    NOTE: The free version must be updated manually.
    How Can I Reduce My Risk?

  4. #14
    Junior Member
    Join Date
    Jun 2013
    Posts
    11

    Default

    Sorry it took so long. What do you think?

    Malwarebytes Anti-Malware 1.75.0.1300
    www.malwarebytes.org

    Database version: v2013.07.10.08

    Windows Vista Service Pack 2 x86 NTFS
    Internet Explorer 9.0.8112.16421
    David & Amber Watts :: WATTS-DESKTOP [administrator]

    7/10/2013 6:55:09 PM
    mbam-log-2013-07-10 (18-55-09).txt

    Scan type: Full scan (C:\|D:\|)
    Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
    Scan options disabled: P2P
    Objects scanned: 564778
    Time elapsed: 2 hour(s), 37 minute(s), 7 second(s)

    Memory Processes Detected: 0
    (No malicious items detected)

    Memory Modules Detected: 0
    (No malicious items detected)

    Registry Keys Detected: 0
    (No malicious items detected)

    Registry Values Detected: 0
    (No malicious items detected)

    Registry Data Items Detected: 0
    (No malicious items detected)

    Folders Detected: 0
    (No malicious items detected)

    Files Detected: 0
    (No malicious items detected)

    (end)

  5. #15
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    that MBAM log cant look any better. I think we are done. Hows it all looking on your end?
    How Can I Reduce My Risk?

  6. #16
    Junior Member
    Join Date
    Jun 2013
    Posts
    11

    Default

    If you think its good. I guess I am good with it.

  7. #17
    Emeritus
    Join Date
    Nov 2005
    Location
    @localhost
    Posts
    6,066

    Default

    Your good. You can click on adwcleaner and click the uninstall button to remove it. You can delete the JRT.exe icon from your desktop as well as the folder located at Local disk C:\JRT. You can delete the Roguekiller icon from your desktops. Note that the free version of malwarebytes must be updated manually and a scan started manually. Some tips to help you stay malware free even though it was kids not yourself. Remind them not to be so click happy and avoid toolbars.

    No software can think for you. Help yourself. In no special order:

    1) It is essential to keep your operating system (Windows) browser (IE, FireFox, Chrome, Opera) and other software up to date to "patch" vulnerabilities that could be exploited.
    Visit Windows Update frequently or use the Windows auto-update feature. Staying updated is also essential for other web based applications like Java, Adobe Flash/Reader, iTunes etc. More and more third party applications are being targeted. Use the auto-update features available in most software.

    Not sure if you are using the latest version of software? Check their version status and get the updates here.

    Check your browser for vulnerabilities.

    2) Know what you are installing to your computer. A lot of software can come bundled with unwanted add-ons, like adware, toolbars and malware. More and more legitimate software are installing useless toolbars or other "offers" if not unchecked first. Toolbars can be resource hogs as well as having privacy concerns.
    Do not install any files from ads, popups or random links. Do not fall for fake warnings about virus and trojans being found on your computer and you are then prompted to install software to remedy this.

    3) Install and keep updated: one antivirus and two or three anti-malware applications. If not updated they will soon be worthless. If either of these frequently find malware then its time to *review your computer habits or lack of habits.*

    4) Refrain from clicking on links or attachments via E-Mail, IM, IRC, Chat Rooms, Blogs or Social Networking Sites, no matter how tempting or legitimate the message may seem. See also E-mail phishing tricks.

    5) Do not click on ads/pop ups or offers from websites requesting that you need to install software to your computer--*for any reason*. Use the Alt+F4 keys to close the window.

    6) Don't click on offers to "scan" your computer. Install ActiveX and Java applets with care. Do you trust the website to install components?

    7) Consider the use of limited (non-privileged) accounts for everyday use, rather than administrator accounts. Limited accounts can help prevent *malware from installing and lessen its potential impact.* This is exactly what user account control (UAC) in Windows Vista, Windows 7 and Windows 8 attempts to address.

    Every Microsoft Security Bulletin that describes a potential remote code execution vulnerability has this sentence in its description:

    "Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights." Fewer rights mean a limited account.

    8) Use Windows native firewall and get a inexpensive hardware router.

    9) Your browser risks. The why and how to secure your browser for safer surfing.
    Consider disabling Java in your browser.
    Check your browser for vulnerabilities.

    10) Warez, cracks, keygens etc are very popular for carrying malware payloads. If you look for these you will encounter malware. If you download/install files via p2p networks you will encounter malware. Do you really trust the source of the file?

    More info with pictures in link below.
    Happy Safe Surfing
    Last edited by tashi; 2013-07-18 at 20:07. Reason: Thank you shelf life :-)
    How Can I Reduce My Risk?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •