Solved Need help removing Windows 64 /Patched.a in c:\Windows\system32\services.exe

Delete your last fixlist.txt file.

Download attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on that particular machine. Running this on another machine may cause damage to your operating system

Run FRST/FRST64 and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt). Please post it to your reply.

In addition post new FSS log.

Good night :)
 

Attachments

  • fixlist.txt
    932 bytes · Views: 6
Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 14-05-2013
Ran by Lunceford at 2013-05-19 23:18:12 Run:4
Running from C:\Users\Lunceford\Downloads
Boot Mode: Normal
==============================================


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MpAsDesc.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MpClient.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MpCmdRun.exe" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MpCommu.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MpEvMsg.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MpOAV.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MpRTP.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MSASCui.exe" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MsMpCom.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MsMpLics.dll" =========


========= End of CMD: =========


========= fsutil reparsepoint delete "C:\Program Files\Windows Defender\MsMpRes.dll" =========


========= End of CMD: =========


========================= Folder: C:\Program Files\Windows Defender ========================

2011-04-12 01:17 - 2011-04-12 01:17 - 0000000 ___AD () C:\Program Files\Windows Defender\en-US
2009-07-13 16:53 - 2009-07-13 18:41 - 0010752 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpAsDesc.dll
2009-07-13 16:53 - 2009-07-13 18:41 - 0571904 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpClient.dll
2009-07-13 16:53 - 2009-07-13 18:39 - 0190976 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpCmdRun.exe
2009-07-13 16:53 - 2009-07-13 18:41 - 0314880 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpCommu.dll
2009-07-13 16:53 - 2009-07-13 18:29 - 0052224 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpEvMsg.dll
2009-07-13 16:53 - 2009-07-13 18:41 - 0052224 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpOAV.dll
2009-07-13 16:53 - 2009-07-13 18:41 - 0200192 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpRTP.dll
2009-07-13 16:54 - 2009-07-13 18:41 - 1011712 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MpSvc.dll
2009-07-13 16:53 - 2009-07-13 18:39 - 0961024 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MSASCui.exe
2010-11-20 20:24 - 2010-11-20 20:24 - 0060928 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MsMpCom.dll
2009-07-13 16:53 - 2009-07-13 18:29 - 0004608 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MsMpLics.dll
2009-07-13 16:53 - 2009-07-13 18:41 - 0487936 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\MsMpRes.dll
2011-04-12 01:17 - 2011-04-12 01:17 - 0035328 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui
2011-04-12 01:17 - 2011-04-12 01:17 - 0015360 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\en-US\MpEvMsg.dll.mui
2011-04-12 01:17 - 2011-04-12 01:17 - 0046592 ____A (Microsoft Corporation) C:\Program Files\Windows Defender\en-US\MsMpRes.dll.mui

====== End of Folder: ======

==== End of Fixlog ====
 
Farbar Service Scanner Version: 14-04-2013
Ran by Lunceford (administrator) on 23-05-2013 at 16:55:41
Running from "C:\Users\Lunceford\Downloads"
Windows 7 Professional Service Pack 1 (X64)
Boot Mode: Normal
****************************************************************

Internet Services:
============

Connection Status:
==============
Localhost is accessible.
LAN connected.
Google IP is accessible.
Google.com is accessible.
Attempt to access Yahoo IP returned error. Yahoo IP is offline
Yahoo.com is accessible.


Windows Firewall:
=============

Firewall Disabled Policy:
==================


System Restore:
============

System Restore Disabled Policy:
========================


Action Center:
============

Windows Update:
============

Windows Autoupdate Disabled Policy:
============================


Windows Defender:
==============
WinDefend Service is not running. Checking service configuration:
The start type of WinDefend service is set to Disabled. The default start type is Auto.
The ImagePath of WinDefend service is OK.
The ServiceDll of WinDefend service is OK.


Other Services:
==============


File Check:
========
C:\Windows\System32\nsisvc.dll => MD5 is legit
C:\Windows\System32\drivers\nsiproxy.sys => MD5 is legit
C:\Windows\System32\dhcpcore.dll => MD5 is legit
C:\Windows\System32\drivers\afd.sys => MD5 is legit
C:\Windows\System32\drivers\tdx.sys => MD5 is legit
C:\Windows\System32\Drivers\tcpip.sys => MD5 is legit
C:\Windows\System32\dnsrslvr.dll => MD5 is legit
C:\Windows\System32\mpssvc.dll => MD5 is legit
C:\Windows\System32\bfe.dll => MD5 is legit
C:\Windows\System32\drivers\mpsdrv.sys => MD5 is legit
C:\Windows\System32\SDRSVC.dll => MD5 is legit
C:\Windows\System32\vssvc.exe => MD5 is legit
C:\Windows\System32\wscsvc.dll => MD5 is legit
C:\Windows\System32\wbem\WMIsvc.dll => MD5 is legit
C:\Windows\System32\wuaueng.dll => MD5 is legit
C:\Windows\System32\qmgr.dll => MD5 is legit
C:\Windows\System32\es.dll => MD5 is legit
C:\Windows\System32\cryptsvc.dll => MD5 is legit
C:\Program Files\Windows Defender\MpSvc.dll => MD5 is legit
C:\Windows\System32\ipnathlp.dll => MD5 is legit
C:\Windows\System32\iphlpsvc.dll => MD5 is legit
C:\Windows\System32\svchost.exe => MD5 is legit
C:\Windows\System32\rpcss.dll => MD5 is legit


**** End of log ****
 
Good job :)

Your computer is clean

1. We need to reset system restore to prevent your computer from being accidentally reinfected by using some old restore point(s). We'll create fresh, clean restore point, using following OTL script:

Run OTL

  • Under the Custom Scans/Fixes box at the bottom, paste in the following:

Code:
:OTL
:Commands
[purity]
[emptytemp]
[EMPTYFLASH]
[emptyjava]
[CLEARALLRESTOREPOINTS]
[Reboot]

  • Then click the Run Fix button at the top
  • Let the program run unhindered, reboot the PC when it is done
  • Post resulting log.

2. Now, we'll remove all tools, we used during our cleaning process

Clean up with OTL:

  • Double-click OTL.exe to start the program.
  • Close all other programs apart from OTL as this step will require a reboot
  • On the OTL main screen, press the CLEANUP button
  • Say Yes to the prompt and then allow the program to reboot your computer.

If you still have any tools or logs leftover on your computer you can go ahead and delete those off of your computer now.

3. Make sure Windows Updates are current.

4. If any trojans, rootkits or bootkits were listed among your infection(s), make sure, you change all of your on-line important passwords (bank account(s), secured web sites, etc.) immediately!

5. Check if your browser plugins are up to date.
Firefox - https://www.mozilla.org/en-US/plugincheck/
other browsers: https://browsercheck.qualys.com/ (click on "Launch a quick scan now" link)

6. Download, and install WOT (Web OF Trust): http://www.mywot.com/. It'll warn you (in most cases) about dangerous web sites.

7. Run Malwarebytes "Quick scan" once in a while to assure safety of your computer.

8. Run Temporary File Cleaner (TFC) weekly.

9. Download and install Secunia Personal Software Inspector (PSI): https://www.techspot.com/downloads/4898-secunia-personal-software-inspector-psi.html. The Secunia PSI is a FREE security tool designed to detect vulnerable and out-dated programs and plug-ins which expose your PC to attacks. Run it weekly.

10. (optional) If you want to keep all your programs up to date, download and install FileHippo Update Checker.
The Update Checker will scan your computer for installed software, check the versions and then send this information to FileHippo.com to see if there are any newer releases.

11. (Windows XP only) Run defrag at your convenience.

12. When installing\updating ANY program, make sure you always select "Custom " installation, so you can UN-check any possible "drive-by-install" (foistware), like toolbars etc., which may try to install along with the legitimate program. Do NOT click "Next" button without looking at any given page.

13. Read:
How did I get infected?, With steps so it does not happen again!: http://www.bleepingcomputer.com/forums/topic2520.html
Simple and easy ways to keep your computer safe and secure on the Internet: http://www.bleepingcomputer.com/tutorials/keep-your-computer-safe-online/

14. Please, let me know, how your computer is doing.
 
Step one

All processes killed
========== OTL ==========
========== COMMANDS ==========

[EMPTYTEMP]

User: All Users

User: AppData

User: Default
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: Default User
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

User: hedev
->Temp folder emptied: 0 bytes

User: Lunceford
->Temp folder emptied: 304059 bytes
->Temporary Internet Files folder emptied: 6489 bytes
->Java cache emptied: 0 bytes
->Google Chrome cache emptied: 414070662 bytes
->Flash cache emptied: 492 bytes

User: Public

User: UpdatusUser
->Temp folder emptied: 0 bytes
->Temporary Internet Files folder emptied: 0 bytes

%systemdrive% .tmp files removed: 0 bytes
%systemroot% .tmp files removed: 0 bytes
%systemroot%\System32 .tmp files removed: 0 bytes
%systemroot%\System32 (64bit) .tmp files removed: 0 bytes
%systemroot%\System32\drivers .tmp files removed: 0 bytes
Windows Temp folder emptied: 18044050 bytes
%systemroot%\sysnative\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files folder emptied: 128 bytes
RecycleBin emptied: 0 bytes

Total Files Cleaned = 412.00 mb


[EMPTYFLASH]

User: All Users

User: AppData

User: Default

User: Default User

User: hedev

User: Lunceford
->Flash cache emptied: 0 bytes

User: Public

User: UpdatusUser

Total Flash Files Cleaned = 0.00 mb


[EMPTYJAVA]

User: All Users

User: AppData

User: Default

User: Default User

User: hedev

User: Lunceford
->Java cache emptied: 0 bytes

User: Public

User: UpdatusUser

Total Java Files Cleaned = 0.00 mb

Restore point Set: OTL Restore Point

OTL by OldTimer - Version 3.2.69.0 log created on 05232013_173247

Files\Folders moved on Reboot...
C:\Users\Lunceford\AppData\Local\Temp\FXSAPIDebugLogFile.txt moved successfully.
C:\Users\Lunceford\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat moved successfully.
File move failed. C:\Windows\temp\_avast_\Webshlock.txt scheduled to be moved on reboot.

PendingFileRenameOperations files...

Registry entries deleted on Reboot...
 
Awesome! All done - programs downloaded - Do you recommend purchasing a subscription to Malwarebytes? It seems to be a pretty good program or is there a similar quality program I can get for free?
 
Back