1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved winscomrssrv.dll startupchecklibrary.dll winlogui.exe malwar

Discussion in 'Virus & Other Malware Removal' started by jj2131, Aug 19, 2019.

Thread Status:
Not open for further replies.
Advertisement
  1. jj2131

    jj2131 Thread Starter

    Joined:
    Aug 9, 2019
    Messages:
    26
    I tried to scan them with kaspersky virus removal tool but did not delete it. They are the only three that has been detected

    Tech Support Guy System Info Utility version 1.0.0.4
    OS Version: Microsoft Windows 7 Home Premium, Service Pack 1, 64 bit
    Processor: Intel(R) Core(TM) i3 CPU 540 @ 3.07GHz, Intel64 Family 6 Model 37 Stepping 2
    Processor Count: 4
    RAM: 6007 Mb
    Graphics Card: NVIDIA GeForce GT 730, -2048 Mb
    Hard Drives: C: 111 GB (33 GB Free); E: 399 GB (127 GB Free); F: 531 GB (279 GB Free);
    Motherboard: Dell Inc., 033FF6
    Antivirus: Avast Antivirus, Enabled and Updated
     
  2. kevinf80

    kevinf80 Malware Specialist

    Joined:
    Mar 21, 2006
    Messages:
    11,383
    First Name:
    Kevin
    Hello again jj21,

    Continue with the following:

    If you do not have Malwarebytes installed do the following:

    Download Malwarebytes version 3 from the following link:

    https://www.malwarebytes.com/mwb-download/thankyou/

    Double click on the installer and follow the prompts. If necessary select the Blue Help tab for video instructions....

    When the install completes or Malwarebytes is already installed do the following:

    Open Malwarebytes, select > "settings" > "protection tab"

    Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

    Go back to "DashBoard" select the Blue "Scan Now" tab......

    When the scan completes quarantine any found entries...

    To get the log from Malwarebytes do the following:

    • Click on the Report tab > from main interface.
    • Double click on the Scan log which shows the Date and time of the scan just performed.
    • Click Export > From export you have two options:

      Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
      Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

    • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…

    Next,

    Download AdwCleaner by Malwarebytes onto your Desktop.

    Or from this Mirror

    • Right-click on AdwCleaner.exe and select [​IMG]Run as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
    • Accept the EULA (I accept), then click on Scan
    • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
    • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
    • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply

    Next,

    Download Farbar Recovery Scan Tool and save it to your desktop.

    Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

    Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

    If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

    Be aware FRST must be run from an account with Administrator status...

    • Double-click to run it. When the tool opens click Yes to disclaimer.
      (Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
    • Make sure Addition.txt is checkmarked under "Optional scans"

      [​IMG]
    • Press Scan button to run the tool....
    • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
    • The tool will also make a log named (Addition.txt) Please attach that log to your reply.

    Let me see those logs in your reply...

    Thank you,

    Kevin....
     
  3. jj2131

    jj2131 Thread Starter

    Joined:
    Aug 9, 2019
    Messages:
    26
    Malwarebytes
    www.malwarebytes.com
    -Log Details-
    Scan Date: 8/20/19
    Scan Time: 8:08 PM
    Log File: 44b671a6-c343-11e9-ac0d-00ff5957e0c2.json
    -Software Information-
    Version: 3.8.3.2965
    Components Version: 1.0.613
    Update Package Version: 1.0.12099
    License: Trial
    -System Information-
    OS: Windows 7 Service Pack 1
    CPU: x64
    File System: NTFS
    User: DELLM-PC\Dell Mario
    -Scan Summary-
    Scan Type: Threat Scan
    Scan Initiated By: Manual
    Result: Completed
    Objects Scanned: 239287
    Threats Detected: 19
    Threats Quarantined: 19
    Time Elapsed: 4 min, 17 sec
    -Scan Options-
    Memory: Enabled
    Startup: Enabled
    Filesystem: Enabled
    Archives: Enabled
    Rootkits: Enabled
    Heuristics: Enabled
    PUP: Detect
    PUM: Detect
    -Scan Details-
    Process: 0
    (No malicious items detected)
    Module: 0
    (No malicious items detected)
    Registry Key: 10
    Backdoor.Agent, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\WDI\SrvHost, Quarantined, [3561], [653659],1.0.12099
    Backdoor.Agent, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{CC96851C-1E79-4BDC-80B7-57F6F761E58E}, Quarantined, [3561], [653659],1.0.12099
    Backdoor.Agent, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{CC96851C-1E79-4BDC-80B7-57F6F761E58E}, Quarantined, [3561], [653659],1.0.12099
    PUP.Optional.InstallCore, HKU\S-1-5-21-2653101016-371608917-3600904547-1000\SOFTWARE\CSASTATS\ic, Quarantined, [447], [586068],1.0.12099
    Trojan.FakeMS, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Microsoft\Windows\Application Experience\StartupCheckLibrary, Quarantined, [3081], [676733],1.0.12099
    Trojan.FakeMS, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{1D0840F5-A27B-44D4-B720-05BA10D76CC2}, Quarantined, [3081], [676733],1.0.12099
    Trojan.FakeMS, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\LOGON\{1D0840F5-A27B-44D4-B720-05BA10D76CC2}, Quarantined, [3081], [676733],1.0.12099
    Trojan.FakeMS.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\Application Experience\StartupCheckLibrary, Quarantined, [4081], [-1],0.0.0
    Trojan.FakeMS.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{1D0840F5-A27B-44D4-B720-05BA10D76CC2}, Quarantined, [4081], [-1],0.0.0
    Trojan.FakeMS.TskLnk, HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Logon\{1D0840F5-A27B-44D4-B720-05BA10D76CC2}, Quarantined, [4081], [-1],0.0.0
    Registry Value: 0
    (No malicious items detected)
    Registry Data: 3
    PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER|ANTIVIRUSDISABLENOTIFY, Replaced, [13228], [293294],1.0.12099
    PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER|FIREWALLDISABLENOTIFY, Replaced, [13228], [293295],1.0.12099
    PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\MICROSOFT\SECURITY CENTER|UPDATESDISABLENOTIFY, Replaced, [13228], [293296],1.0.12099
    Data Stream: 0
    (No malicious items detected)
    Folder: 0
    (No malicious items detected)
    File: 6
    Backdoor.Agent, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\WDI\SrvHost, Quarantined, [3561], [653659],1.0.12099
    Backdoor.Agent, C:\WINDOWS\SYSTEM32\WINSCOMRSSRV.DLL, Quarantined, [3561], [653659],1.0.12099
    Trojan.FakeMS, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\Application Experience\StartupCheckLibrary, Quarantined, [3081], [676733],1.0.12099
    Trojan.FakeMS.TskLnk, C:\WINDOWS\SYSTEM32\STARTUPCHECKLIBRARY.DLL, Quarantined, [4081], [676770],1.0.12099
    Trojan.FakeMS.TskLnk, C:\WINDOWS\SYSTEM32\TASKS\Microsoft\Windows\Application Experience\StartupCheckLibrary, Quarantined, [4081], [-1],0.0.0
    Trojan.FakeMS, C:\WINDOWS\SYSTEM32\WINLOGUI.EXE, Quarantined, [3081], [646232],1.0.12099
    Physical Sector: 0
    (No malicious items detected)
    WMI: 0
    (No malicious items detected)
    (end)
    # -------------------------------
    # Malwarebytes AdwCleaner 7.4.0.0
    # -------------------------------
    # Build: 07-23-2019
    # Database: 2019-08-13.1 (Cloud)
    # Support: https://www.malwarebytes.com/support
    #
    # -------------------------------
    # Mode: Clean
    # -------------------------------
    # Start: 08-20-2019
    # Duration: 00:00:01
    # OS: Windows 7 Home Premium
    # Cleaned: 9
    # Failed: 0
     

    Attached Files:

  4. kevinf80

    kevinf80 Malware Specialist

    Joined:
    Mar 21, 2006
    Messages:
    11,383
    First Name:
    Kevin
    Thanks for those logs, continue:

    Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
    NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

    Open FRST and press the Fix button just once and wait.
    The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

    Next,

    Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop

    Ensure to get the correct version for your system....

    https://www.microsoft.com/en-gb/download/malicious-software-removal-tool-details.aspx


    Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window
    In the "Scan Type" window, select Quick Scan
    Perform a scan and Click Finish when the scan is done.


    Retrieve the MSRT log as follows, and post it in your next reply:

    1) Select the Windows key and R key together to open the "Run" function
    2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

    notepad c:\windows\debug\mrt.log

    The log will include log details for each time MSRT has run, we only need the most recent log by date and time....

    Next,

    If Avast is to be the chosen security program then MSE should be uninstalled... Use the uninstaller from the following link:

    https://www.bleepingcomputer.com/download/microsoft-security-essentials-removal-tool/

    Let me know if there are any remaining issues or concerns..
     

    Attached Files:

  5. jj2131

    jj2131 Thread Starter

    Joined:
    Aug 9, 2019
    Messages:
    26
    ---------------------------------------------------------------------------------------
    Microsoft Windows Malicious Software Removal Tool v5.75, August 2019 (build 5.75.16236.1)
    Started On Wed Aug 21 13:19:24 2019
    Engine: 1.1.16200.1
    Signatures: 1.299.474.0
    MpGear: 1.1.15747.1
    Run Mode: Interactive Graphical Mode
    Results Summary:
    ----------------
    No infection found.
    Successfully Submitted Heartbeat Report
    Microsoft Windows Malicious Software Removal Tool Finished On Wed Aug 21 13:22:52 2019
    Return code: 0 (0x0)
     

    Attached Files:

  6. kevinf80

    kevinf80 Malware Specialist

    Joined:
    Mar 21, 2006
    Messages:
    11,383
    First Name:
    Kevin
    Any remaining issues or concerns...?
     
  7. jj2131

    jj2131 Thread Starter

    Joined:
    Aug 9, 2019
    Messages:
    26
    I think none. Thank you! just wanna know how to clean/uninstall the softwares :)
     
  8. kevinf80

    kevinf80 Malware Specialist

    Joined:
    Mar 21, 2006
    Messages:
    11,383
    First Name:
    Kevin
    Download and run the Malwarebytes Support Tool
    Accept the EULA and click Advanced tab on the left (not Start Repair)
    Click the Clean button, and allow it to restart your system. Ignore the option to rinstall...

    Next,

    Right click on FRST here: E:\Downloads\FRST64.exe and rename uninstall.exe when complete right click on uninstall.exe and select "Run as Administrator"

    If you do not see the .exe appended that is because file extensions are hidden, in that case just rename FRST64 to uninstall

    That action will remove FRST and all created files and folders...

    Next,

    Remove all System Restore Points: https://www.tenforums.com/tutorials/33593-delete-system-restore-points-windows-10-a.html#option2

    Create clean fresh Restore Point: http://www.thewindowsclub.com/create-system-restore-point

    Run Windows Disk Clean Up Utility - https://neosmart.net/wiki/disk-cleanup/

    From there you should be good to go...

    Next,

    Read the following links to fully understand PC Security and Best Practices, you may find them useful....

    Answers to Common Security Questions and best Practices

    Do I need a Registry Cleaner?

    Take care and surf safe

    Kevin... [​IMG]
     
  9. jj2131

    jj2131 Thread Starter

    Joined:
    Aug 9, 2019
    Messages:
    26
    Thank you! all done :)
     
  10. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Loading...
Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/1231710

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice