J
jackneedshelpwithcomp
Guest
Lets just say I have been dealing with quite the virus that wont get removed no matter what. It disabled quite a lot of features on windows such as Online protection on both windows defender and Malware bytes, blocks me from reinstalling windows, and it did block me from using windows defender altogether at first but I found a fix. It Would really be great if anyone can fix it. This is from a download if you really need to know to fix it.
Below me is what was scanned.
Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 4/23/19
Scan Time: 7:33 PM
Log File: 9caf4cc0-6628-11e9-8e81-000000000000.json
-Software Information-
Version: 3.7.1.2839
Components Version: 1.0.563
Update Package Version: 1.0.10302
License: Free
-System Information-
OS: Windows 10 (Build 17134.648)
CPU: x64
File System: NTFS
User: DESKTOP-9GK09J9\awesomepokemaster
-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 439167
Threats Detected: 21
Threats Quarantined: 0
Time Elapsed: 8 min, 16 sec
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
-Scan Details-
Process: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registry Key: 4
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ZDY4NDFiOGY1YThjYT, No Action By User, [4884], [580236],1.0.10302
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, No Action By User, [4884], [-1],0.0.0
Trojan.Yelloader, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WINDOWSMANAGEMENTSERVICE, No Action By User, [2732], [552318],1.0.10302
PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE, No Action By User, [4027], [506357],1.0.10302
Registry Value: 8
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ZDY4NDFiOGY1YThjYT|IMAGEPATH, No Action By User, [4884], [580236],1.0.10302
Adware.Wajam.Generic, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, No Action By User, [4884], [-1],0.0.0
Adware.Wajam.Generic, HKU\S-1-5-21-3514438651-1852965482-2251626450-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, No Action By User, [4884], [-1],0.0.0
Adware.Wajam.Generic, HKU\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, No Action By User, [4884], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{07685614-1cd3-4696-968b-4f1fcf740b1f}|NAMESERVER, No Action By User, [7387], [260227],1.0.10302
Trojan.Yelloader, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WINDOWSMANAGEMENTSERVICE|IMAGEPATH, No Action By User, [2732], [552318],1.0.10302
PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE|IMAGEPATH, No Action By User, [4027], [506357],1.0.10302
Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{D9F5C86E-C7AE-4BFF-B661-F918382BD108}, No Action By User, [1029], [509082],1.0.10302
Registry Data: 8
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{07685614-1cd3-4696-968b-4f1fcf740b1f}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{07685614-1cd3-4696-968b-4f1fcf740b1f}|DhcpNameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{1859b595-60ec-429b-9b0c-507bcd3cb514}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{43851f57-e499-45bf-aea8-8758afc7971b}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{4edb424a-d556-11e7-ab0f-806e6f6e6963}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{9ff14aad-2733-418d-9104-2a5af84e5548}|NameServer, No Action By User, [7387], [-1],0.0.0
Data Stream: 0
(No malicious items detected)
Folder: 0
(No malicious items detected)
File: 1
PUP.Optional.OnlineIO, C:\WINDOWS\INSTALLER\SOURCEHASH{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}, No Action By User, [3684], [391431],1.0.10302
Physical Sector: 0
(No malicious items detected)
WMI: 0
(No malicious items detected)
(end)
Continue reading...
Below me is what was scanned.
Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 4/23/19
Scan Time: 7:33 PM
Log File: 9caf4cc0-6628-11e9-8e81-000000000000.json
-Software Information-
Version: 3.7.1.2839
Components Version: 1.0.563
Update Package Version: 1.0.10302
License: Free
-System Information-
OS: Windows 10 (Build 17134.648)
CPU: x64
File System: NTFS
User: DESKTOP-9GK09J9\awesomepokemaster
-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 439167
Threats Detected: 21
Threats Quarantined: 0
Time Elapsed: 8 min, 16 sec
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect
-Scan Details-
Process: 0
(No malicious items detected)
Module: 0
(No malicious items detected)
Registry Key: 4
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ZDY4NDFiOGY1YThjYT, No Action By User, [4884], [580236],1.0.10302
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NLASVC\PARAMETERS\INTERNET\MANUALPROXIES, No Action By User, [4884], [-1],0.0.0
Trojan.Yelloader, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WINDOWSMANAGEMENTSERVICE, No Action By User, [2732], [552318],1.0.10302
PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE, No Action By User, [4027], [506357],1.0.10302
Registry Value: 8
Adware.Wajam.Generic, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\ZDY4NDFiOGY1YThjYT|IMAGEPATH, No Action By User, [4884], [580236],1.0.10302
Adware.Wajam.Generic, HKU\S-1-5-18\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, No Action By User, [4884], [-1],0.0.0
Adware.Wajam.Generic, HKU\S-1-5-21-3514438651-1852965482-2251626450-1001\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, No Action By User, [4884], [-1],0.0.0
Adware.Wajam.Generic, HKU\.DEFAULT\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS|PROXYENABLE, No Action By User, [4884], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\INTERFACES\{07685614-1cd3-4696-968b-4f1fcf740b1f}|NAMESERVER, No Action By User, [7387], [260227],1.0.10302
Trojan.Yelloader, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\WINDOWSMANAGEMENTSERVICE|IMAGEPATH, No Action By User, [2732], [552318],1.0.10302
PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE|IMAGEPATH, No Action By User, [4027], [506357],1.0.10302
Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{D9F5C86E-C7AE-4BFF-B661-F918382BD108}, No Action By User, [1029], [509082],1.0.10302
Registry Data: 8
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS|DhcpNameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{07685614-1cd3-4696-968b-4f1fcf740b1f}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{07685614-1cd3-4696-968b-4f1fcf740b1f}|DhcpNameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{1859b595-60ec-429b-9b0c-507bcd3cb514}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{43851f57-e499-45bf-aea8-8758afc7971b}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{4edb424a-d556-11e7-ab0f-806e6f6e6963}|NameServer, No Action By User, [7387], [-1],0.0.0
Trojan.DNSChanger.ACMB2, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{9ff14aad-2733-418d-9104-2a5af84e5548}|NameServer, No Action By User, [7387], [-1],0.0.0
Data Stream: 0
(No malicious items detected)
Folder: 0
(No malicious items detected)
File: 1
PUP.Optional.OnlineIO, C:\WINDOWS\INSTALLER\SOURCEHASH{5266F634-7B7D-4537-BDDC-98DD6CFCBAA1}, No Action By User, [3684], [391431],1.0.10302
Physical Sector: 0
(No malicious items detected)
WMI: 0
(No malicious items detected)
(end)
Continue reading...