Jump to content

chroject.a and regenerating process


NINa7X
 Share

Recommended Posts

Hello,

 

I started my PC today and a few moments later noticed a significant drop in performance. I noticed that Microsoft Security Essentials kept popping up with a notice that it was handling a problem, so I used it to scan. Upon completion, a few "malicious items" were detected and dealt with, yet the problem persisted. I also have Malwarebytes installed so I updated and scanned with this. This Chroject.a was found but neither security program was able to deal with the problem. Furthermore I opened the task manager to find this process called "dyarynm.exe*32". It appears that this is what MSE is catching but it keeps regenerating itself. This process has a description that says "Google Chrome". The logs from FRST are included as attachments below, copy and paste would not work. Also, I do not see any way to receive immediate email notifications. I am new to posting here and appreciate your help.

 

Thank you very much.

 

 

FRST.txt

Addition.txt

Link to post
Share on other sites

Hello NINa7X, welcome to Malwarebytes' Malware Removal forum!
 
My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems.
If you would allow me to call you by your first name I would prefer that. xsmile.png.pagespeed.ic.CwSpBGGvqN.png
 
General P2P/Piracy Notice: 
 

If you are using Peer to Peer (P2P) filesharing software such as uTorrent, BitTorrent or similar you must either fully uninstall or completely disable the programme(s) from running whilst receiving assistance at this forum. 
Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.
If you have illegal/cracked/keygen or similar software on the computer, please remove/uninstall the software now and read the policy on Piracy. Failure to do so will also result in your topic being closed.

 
======================================================
 
Please read through the points below to ensure this process moves as quickly and efficiently as possible.

  • Please read through my instructions thoroughly, and ensure you carry out each step in the order specified.
  • Please do not post logs using the CODEQUOTE or ATTACHMENT format. Logs should be posted directly in plain text. If you receive an error whilst posting, please break the log in half and use multiple posts.
  • Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation and providing the best set of instructions for you.
  • Please backup important file before proceeding with my instructions. Malware removal can be unpredictable.
  • If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before proceeding.
  • Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.
     

======================================================
 
Attaching is fine if you can't copy/paste.
You are currently set to follow this topic, so should receive an email notification each time I respond. 
 
Please do the following. 
 
STEP 1
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Script

NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System.

  • Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Click Fix.
  • A log (Fixlog.txt) will open on your desktop. This log will be very large, so ensure you attach the file. 
     

STEP 2
BY4dvz9.png AdwCleaner

  • Please download AdwCleaner and save the file to your Desktop.
  • Right-Click AdwCleaner.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Follow the prompts. 
  • Click Scan
  • Upon completion, click Report. A log (AdwCleaner[R0].txt) will open. Briefly check the log for anything you know to be legitimate. 
  • Ensure anything you know to be legitimate does not have a checkmark, and click Clean
  • Follow the prompts and allow your computer to reboot
  • After rebooting, a log (AdwCleaner[s0].txt) will open. Copy the contents of the log and paste in your next reply.

-- File and registry key backups are made for anything removed using this tool. Should a legitimate entry be removed (otherwise known as a 'false-positive'), simple steps can be taken to restore the entry. Please do not overly concern yourself with the contents of AdwCleaner[R0].txt.
 

STEP 3
E3feWj5.png Junkware Removal Tool (JRT)

  • Please download Junkware Removal Tool and save the file to your Desktop.
  • Note: If you unchecked any items in AdwCleaner, please backup the associated folders/files before running JRT.
  • Temporarily disable your anti-virus software. For instructions, please refer to the following link.
  • Right-Click JRT.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Follow the prompts and allow the scan to run uninterrupted. 
  • Upon completion, a log (JRT.txt) will open on your desktop.
  • Re-enable your anti-virus software.
  • Copy the contents of JRT.txt and paste in your next reply.
     

STEP 4
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Scan

  • Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Click Yes to the disclaimer.
  • Ensure the Addition.txt box is checked.
  • Click the Scan button and let the programme run.
  • Upon completion, click OK, then OK on the Addition.txt pop up screen.
  • Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply. 
     

======================================================

STEP 5
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

  • Fixlog.txt
  • AdwCleaner[s0].txt
  • JRT.txt
  • FRST.txt
  • Addition.txt
Link to post
Share on other sites

Hey Adam,

 

You can call me Larry. I followed the instructions you gave so here are the logs. I'm fairly unfamiliar with the processes of these tools but I hope things look better. The computer seems to be running better already. Security Essentials is no longer popping up continuously and that process is no longer there when I open task manager.

 

Thank you again for your help, and I hope we can get this fixed.

Fixlog.txt

AdwCleanerS0.txt

JRT.txt

FRST.txt

Addition.txt

Link to post
Share on other sites

Hi Larry, 
 
Those logs are looking much better. 
Please provide an update on your computer after completing the steps below. Are there any outstanding issues?
 
STEP 1
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Script

  • Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type Notepad and click OK.
  • Copy the entire contents of the codebox below and paste into the Notepad document.
    start2014-11-03 18:54 - 2014-11-03 18:54 - 0294912 _____ (Borland Software Corporation) C:\Users\christine\AppData\LocalLow\fvhinyk.dll2014-06-23 11:59 - 2014-06-23 11:59 - 0126523 _____ () C:\Users\christine\AppData\LocalLow\Pre9BA8.tmp2014-06-23 11:59 - 2014-06-23 11:59 - 0224765 _____ () C:\Users\christine\AppData\LocalLow\Pre9CF0.tmp2014-06-23 11:59 - 2014-06-23 11:59 - 0198057 _____ () C:\Users\christine\AppData\LocalLow\Pre9E96.tmp2014-10-18 23:54 - 2014-10-18 23:54 - 0000000 _____ () C:\Users\christine\AppData\LocalLow\seetla.dll2014-10-17 21:59 - 2014-11-08 14:18 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\Adobe\fgcxfbmrqjki2014-10-17 21:58 - 2014-11-08 14:18 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\EmieUserList\Awitlzjoo2014-11-08 14:19 - 2014-11-08 14:19 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\Apple Computer\Zcqxjrhwzjy2014-10-17 21:59 - 2014-11-08 14:18 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\Microsoft\etwqjnklpjEmptyTemp:end
  • Click FileSave As and type fixlist.txt as the File Name
  • Important: The file must be saved in the same location as FRST64.exe. 

NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System.

  • Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Click Fix.
  • A log (Fixlog.txt) will open on your desktop. Copy the contents of the log and paste in your next reply.
     

STEP 2
GfiJrQ9.png Malwarebytes Anti-Malware (MBAM)

  • Open Malwarebytes Anti-Malware and click Update Now.
  • Once updated, click the Settings tab, followed by Detection and Protection and tick Scan for rootkits.
  • Click the Scan tab, ensure Threat Scan is checked and click Scan Now.
  • Note: You may see the following message, "Could not load DDA driver". Click Yes, allow your PC to reboot and continue afterwards. 
  • If threats are detected, click the Apply Actions button. You will now be prompted to reboot. Click Yes.
  • Upon completion of the scan (or after the reboot), click the History tab.
  • Click Application Logs and double-click the Scan Log.
  • Click Copy to Clipboard and paste the log in your next reply. 
     

STEP 3
GzlsbnV.png ESET Online Scan
Note: This scan may take a long time to complete. Please do not browse the Internet whilst your Anti-Virus is disabled.

  • Please download ESET Online Scan and save the file to your Desktop.
  • Temporarily disable your anti-virus software. For instructions, please refer to the following link.
  • Double-click esetsmartinstaller_enu.exe to run the programme. 
  • Agree to the EULA by placing a checkmark next to Yes, I accept the Terms of Use. Then click Start.
  • Agree to the Terms of Use once more and click Start. Allow components to download.
  • Place a checkmark next to Enable detection of potentially unwanted applications.
  • Click Hide advanced settings. Place a checkmark next to:
    • Scan archives
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Ensure Remove found threats is unchecked.
  • Click Start.
  • Wait for the scan to finish. Please be patient as this can take some time.
  • Upon completion, click esetListThreats.png. If no threats were found, skip the next two bullet points. 
  • Click esetExport.png and save the file to your Desktop, naming it something such as "MyEsetScan".
  • Push the Back button.
  • Place a checkmark next to xKN1w2nv.png.pagespeed.ic.JWqIaEgZi7.png and click SzOC1p0.png.pagespeed.ce.OWDP45O6oG.png.
  • Re-enable your anti-virus software.
  • Copy the contents of the log and paste in your next reply.
     

======================================================

STEP 4
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

  • Fixlog.txt
  • MBAM Scan log
  • ESET Online Scan log
  • Are there any outstanding issues?
Link to post
Share on other sites

Alright Adam,

 

Finally finished the steps you posted. The computer seems to be running well and I haven't noticed any real problems. I was looking in task manager just to see if there were any strange processes or anything and I noticed a csrss.exe and a winlogon.exe that don't list a username or description, which I thought was suspicious. Also, the "open file location" and "properties" options for these don't open any windows. Other than this though, everything seems to be fine. Also I switched to using firefox and copy and paste works here so i pasted the logs below.

 

Thanks again.

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 10-11-2014
Ran by christine at 2014-11-10 18:17:21 Run:2
Running from C:\Users\christine\Desktop
Loaded Profile: christine (Available profiles: christine & Guest)
Boot Mode: Normal
==============================================

Content of fixlist:
*****************
start
2014-11-03 18:54 - 2014-11-03 18:54 - 0294912 _____ (Borland Software Corporation) C:\Users\christine\AppData\LocalLow\fvhinyk.dll
2014-06-23 11:59 - 2014-06-23 11:59 - 0126523 _____ () C:\Users\christine\AppData\LocalLow\Pre9BA8.tmp
2014-06-23 11:59 - 2014-06-23 11:59 - 0224765 _____ () C:\Users\christine\AppData\LocalLow\Pre9CF0.tmp
2014-06-23 11:59 - 2014-06-23 11:59 - 0198057 _____ () C:\Users\christine\AppData\LocalLow\Pre9E96.tmp
2014-10-18 23:54 - 2014-10-18 23:54 - 0000000 _____ () C:\Users\christine\AppData\LocalLow\seetla.dll
2014-10-17 21:59 - 2014-11-08 14:18 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\Adobe\fgcxfbmrqjki
2014-10-17 21:58 - 2014-11-08 14:18 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\EmieUserList\Awitlzjoo
2014-11-08 14:19 - 2014-11-08 14:19 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\Apple Computer\Zcqxjrhwzjy
2014-10-17 21:59 - 2014-11-08 14:18 - 0000000 ____D () C:\Users\christine\AppData\LocalLow\Microsoft\etwqjnklpj
EmptyTemp:
end
*****************

C:\Users\christine\AppData\LocalLow\fvhinyk.dll => Moved successfully.
C:\Users\christine\AppData\LocalLow\Pre9BA8.tmp => Moved successfully.
C:\Users\christine\AppData\LocalLow\Pre9CF0.tmp => Moved successfully.
C:\Users\christine\AppData\LocalLow\Pre9E96.tmp => Moved successfully.
C:\Users\christine\AppData\LocalLow\seetla.dll => Moved successfully.
C:\Users\christine\AppData\LocalLow\Adobe\fgcxfbmrqjki => Moved successfully.
C:\Users\christine\AppData\LocalLow\EmieUserList\Awitlzjoo => Moved successfully.
C:\Users\christine\AppData\LocalLow\Apple Computer\Zcqxjrhwzjy => Moved successfully.
C:\Users\christine\AppData\LocalLow\Microsoft\etwqjnklpj => Moved successfully.
EmptyTemp: => Removed 14.3 MB temporary data.


The system needed a reboot.

==== End of Fixlog ====

 

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 11/10/2014
Scan Time: 6:22:13 PM
Logfile:
Administrator: Yes

Version: 2.00.3.1025
Malware Database: v2014.11.10.10
Rootkit Database: v2014.11.10.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: christine

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 359085
Time Elapsed: 10 min, 32 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)

 

 

//Eset Scan Results <--- My writing

 

C:\AdwCleaner\Quarantine\C\Users\christine\Funmoods\1.5.23.22\escortShld.dll.vir    Win32/Toolbar.Funmoods potentially unwanted application
C:\FRST\Quarantine\C\Users\christine\AppData\Local\Nikon\Orsbifqy.dll.xBAD    Win32/TrojanDownloader.Tracur.AM trojan
C:\FRST\Quarantine\C\Users\christine\AppData\LocalLow\fvhinyk.dll.xBAD    Win32/TrojanDownloader.Tracur.AM trojan
C:\Users\christine\Downloads\Adobe_Reader_v.XI.exe    Win32/DomaIQ.C potentially unwanted application
C:\Users\christine\Downloads\iTunes_Setup.exe    Win32/Spy.Zbot.ZR trojan
 

Link to post
Share on other sites

Hi Larry, 
 

was looking in task manager just to see if there were any strange processes or anything and I noticed a csrss.exe and a winlogon.exe that don't list a username or description, which I thought was suspicious.

This is normal. Both are legitimate System Files.
If they weren't the legitimate System Files of those names, they would have shown in your FRST logs, flagged by Malwarebytes, ESET, etc. 
 
Delete these files. Ensure you empty the Recycle Bin afterwards.

  • C:\Users\christine\Downloads\Adobe_Reader_v.XI.exe    
  • C:\Users\christine\Downloads\iTunes_Setup.exe    
     

Update Adobe Air to the latest version. 
 
----------------

 

Now for the good news!
 
All Clean!
Congratulations, your computer appears clean! :)
I no longer see signs of malware on your computer, and feel satisfied that our work here is done. The steps below will remove the tools we have used, and reset any settings changed. I have also provided a list of resources and tools that you may find useful
 
My help will always be free. But if you are happy with the help provided, and would like to support my fight against malware and/or buy me a beer, please consider a donation. YSCcjW7.png
 

AFZxnZc.jpg DelFix

  • Please download DelFix and save the file to your Desktop.
  • Double-click DelFix.exe to run the programme.
  • Place a checkmark next to the following items:
    • Activate UAC
    • Remove disinfection tools
    • Create registry backup
    • Purge system restore
    • Reset system settings
  • Click the Run button.

-- This will remove the specialised tools we used to disinfect your system. Any leftover logs, files, folders or tools remaining on your Desktop which were not removed can be deleted manually (right-click the file + delete).
 
======================================================
 
I have compiled below a list of resources you may find useful. The articles document information on computer security, common infection vectors and how you can stay safe on the Internet.

The following programmes come highly recommended in the security community.

  • xKsUqI5A.png.pagespeed.ic.vn1Hlvqi8h.jpg AdBlock is a browser add-on that blocks annoying banners, pop-ups and video ads.
  • E8I37RF.pngCryptoPrevent places policy restrictions on loading points for ransomware (eg. CryptoWall), preventing your files from being encrypted.
  • EG85Vjt.png Malwarebytes Anti-Exploit (MBAE) is designed to prevent zero-day malware from exploiting vulnerable software.
  • x6YRrgUC.png.pagespeed.ic.HjgFxjvw2Z.jpg Malwarebytes Anti-Malware Premium (MBAM) works in real-time along side your Anti-Virus to prevent malware execution.
  • xjv4nhMJ.png.pagespeed.ic.A5YbWn1eDO.png NoScript is a Firefox add-on that blocks the actions of malicious scripts by using whitelisting and other technology.
  • 3O8r9Uq.png Sandboxie isolates programmes of your choice, preventing files from being written to your HDD unless approved by you.
  • DgW1XL2.png.pagespeed.ce.v1OlJl_ZAS.png Secuina PSI will scan your computer for vulnerable software that is outdatedand automatically find the latest update for you.
  • xj1OLIec.png.pagespeed.ic.k6hhwopU0q.jpg SpywareBlaster is a form of passive protection, designed to block the actions of malicious websites and tracking cookies.
  • xJEP5iWI.png.pagespeed.ic.4tmM1lM7DQ.png Web of Trust (WOT) is a browser add-on designed to alert you before interacting with a potentially malicious website.

-- Please feel free to ask if you have any questions or concerns on computer security or the programmes above.
 
======================================================
 
Please confirm you have no outstanding issues, and are happy with the state of your computer. Once I have confirmation things are in order, we can wrap things up and I will close this thread. 
 
Thank you for using Malwarebytes.
 
Safe Surfing. :)    
Adam (LiquidTension).

Link to post
Share on other sites

  • 2 weeks later...
  • Root Admin

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.