Jump to content

Recommended Posts

My Windows 8 PC has been hijacked several times over the past few days while using Chrome. Each time it sends me to instantpcupdate.info telling me to update my flash player and on more than one occasion it started downloaded a file automatically. Scans turn up nothing.

 

I have attached my Farbar logs.

 

Thanks for the help - 

 

thenewno2

FRST.txt

Addition.txt

Link to post
Share on other sites
  • Staff

Hello thenewno2, welcome to Malwarebytes' Malware Removal forum!
 
My username is LiquidTension, but you can call me Adam. I will be assisting you with your malware-related problems.
If you would allow me to call you by your first name I would prefer that. :)
 
General P2P/Piracy Notice: 
 

If you are using Peer to Peer (P2P) filesharing software such as uTorrent, BitTorrent or similar you must either fully uninstall or completely disable the programme(s) from running whilst receiving assistance at this forum. 
Failure to remove or disable such software will result in your topic being closed and no further assistance being provided.
If you have illegal/cracked/keygen or similar software on the computer, please remove/uninstall the software now and read the policy on Piracy. Failure to do so will also result in your topic being closed.

 
======================================================
 
Please read through the points below to ensure this process moves as quickly and efficiently as possible.

  • Please ensure you read through my instructions thoroughly, and carry out each step in the order specified.
  • If you are unable to copy/paste your logs directly into your post, please attach the file. 
  • Please do not run any tools or take any steps other than those I provide for you. Independent efforts may make matters worse, and will affect my ability in ascertaining the current situation and providing the best set of instructions for you.
  • Please backup important files before proceeding with my instructions. Malware removal can be unpredictable.
  • If you come across any issues whilst following my instructions, please stop and inform me of the issue in as much detail as possible. Please do not hesitate to ask before proceeding.
  • Topics are locked if no response is made after 4 days. Please inform me if you will require additional time to complete my instructions.
  • Ensure you are following this topic. Click xetYzdbu.png.pagespeed.ic.U7AjmRUewW.png at the top of the page. 
     

======================================================

STEP 1
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Script

  • Press the Windows Key pdKOQKY.png + r on your keyboard at the same time. Type Notepad and click OK.
  • Copy the entire contents of the codebox below and paste into the Notepad document.
    startHKU\S-1-5-21-156000408-1667873382-2985492148-1001\...\MountPoints2: {3dc14705-2566-11e4-be9e-c4d9872b6253} - "I:\VZW_Software_upgrade_assistant.exe"SearchScopes: HKLM -> DefaultScope {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJBSearchScopes: HKLM -> {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJBSearchScopes: HKLM-x32 -> DefaultScope {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJBSearchScopes: HKLM-x32 -> {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJBSearchScopes: HKU\S-1-5-21-156000408-1667873382-2985492148-1001 -> DefaultScope {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = SearchScopes: HKU\S-1-5-21-156000408-1667873382-2985492148-1001 -> {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = S2 0242031416798932mcinstcleanup; C:\Users\John\AppData\Local\Temp\024203~1.EXE [836168 2014-03-13] (McAfee, Inc.)S4 mfefire; "C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe" [X]C:\Program Files\Common Files\McAfeeS2 mfevtp; "C:\Windows\system32\mfevtps.exe" [X]S0 cfwids; system32\drivers\cfwids.sys [X]S0 mfeapfk; system32\drivers\mfeapfk.sys [X]R0 mfeavfk; system32\drivers\mfeavfk.sys [X]S0 mfeelamk; system32\drivers\mfeelamk.sys [X]S0 mfefirek; system32\drivers\mfefirek.sys [X]R0 mfehidk; system32\drivers\mfehidk.sys [X]R0 mfewfpk; system32\drivers\mfewfpk.sys [X]S4 NvStUSB; \SystemRoot\System32\drivers\nvstusb.sys [X]C:\ProgramData\Dell Click 2 Fix+-64-bit-V2545.exeC:\Users\John\AppData\Local\Temp\0242031416798932mcinst.exeC:\Users\John\AppData\Local\Temp\CreativeCloudSet-Up.exeC:\Users\John\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmp5rk9ml.dllC:\Users\John\AppData\Local\Temp\jre-7u67-windows-i586-iftw.exeC:\Users\John\AppData\Local\Temp\nvSCPAPI.dllC:\Users\John\AppData\Local\Temp\nvSCPAPI64.dllC:\Users\John\AppData\Local\Temp\nvStInst.exeC:\Users\John\AppData\Local\Temp\Quarantine.exeC:\Users\John\AppData\Local\Temp\sqlite3.dllC:\Users\John\AppData\Local\Temp\SRLDetectionLibrary7803777365940062332.dllC:\Users\John\AppData\Local\Temp\vcredist_x64.exeC:\Users\John\AppData\Local\Temp\vcredist_x86.exeC:\Users\John\AppData\Local\Temp\xmlUpdater.exeCustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{0F22A205-CFB0-4679-8499-A6F44A80A208}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.25.5\psuser_64.dll No FileCustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{355EC88A-02E2-4547-9DEE-F87426484BD1}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.23.9\psuser_64.dll No FileCustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{90B3DFBF-AF6A-4EA0-8899-F332194690F8}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.24.15\psuser_64.dll No FileCustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{FE498BAB-CB4C-4F88-AC3F-3641AAAF5E9E}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.24.7\psuser_64.dll No FileAlternateDataStreams: C:\ProgramData\Temp:6DAA43DBCMD: ipconfig /flushdnsCMD: netsh winsock reset allEmptyTemp:end
  • Click FileSave As and type fixlist.txt as the File Name
  • Important: The file must be saved in the same location as FRST64.exe. 

NOTICE: This script is intended for use on this particular machine. Do not use this script on any other machine; doing so may cause damage to your Operating System.

  • Right-Click FRST64.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Click Fix.
  • A log (Fixlog.txt) will open on your desktop. Copy the contents of the log and paste in your next reply.
     

STEP 2
GfiJrQ9.png Malwarebytes Anti-Malware (MBAM)

  • Open Malwarebytes Anti-Malware and click Update Now.
  • Once updated, click the Settings tab, followed by Detection and Protection and tick Scan for rootkits.
  • Click the Scan tab, ensure Threat Scan is checked and click Scan Now.
  • Note: You may see the following message, "Could not load DDA driver". Click Yes, allow your PC to reboot and continue afterwards. 
  • If threats are detected, click the Apply Actions button. You will now be prompted to reboot. Click Yes.
  • Upon completion of the scan (or after the reboot), click the History tab.
  • Click Application Logs and double-click the Scan Log.
  • Click Copy to Clipboard and paste the log in your next reply. 
     

STEP 3
BY4dvz9.png AdwCleaner

  • Please download AdwCleaner and save the file to your Desktop.
  • Right-Click AdwCleaner.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Follow the prompts. 
  • Click Scan
  • Upon completion, click Report. A log (AdwCleaner[R0].txt) will open. Briefly check the log for anything you know to be legitimate. 
  • Ensure anything you know to be legitimate does not have a checkmark, and click Clean
  • Follow the prompts and allow your computer to reboot
  • After rebooting, a log (AdwCleaner[s0].txt) will open. Copy the contents of the log and paste in your next reply.

-- File and registry key backups are made for anything removed using this tool. Should a legitimate entry be removed (otherwise known as a 'false-positive'), simple steps can be taken to restore the entry. Please do not overly concern yourself with the contents of AdwCleaner[R0].txt.
 
 
STEP 4
E3feWj5.png Junkware Removal Tool (JRT)

  • Please download Junkware Removal Tool and save the file to your Desktop.
  • Note: If you unchecked any items in AdwCleaner, please backup the associated folders/files before running JRT.
  • Temporarily disable your anti-virus software. For instructions, please refer to the following link.
  • Right-Click JRT.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Follow the prompts and allow the scan to run uninterrupted. 
  • Upon completion, a log (JRT.txt) will open on your desktop.
  • Re-enable your anti-virus software.
  • Copy the contents of JRT.txt and paste in your next reply.

 
======================================================
 
STEP 5
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

  • Fixlog.txt
  • MBAM log
  • AdwCleaner[s0].txt
  • JRT.txt
Link to post
Share on other sites

Thanks for the help Adam. I'm John.

 

 

Here are the logs:

 

 

 

 

Fix result of Farbar Recovery Tool (FRST written by Farbar) (x64) Version: 23-11-2014 01
Ran by John at 2014-11-24 08:24:59 Run:1
Running from D:\Downloads
Loaded Profile: John (Available profiles: John)
Boot Mode: Normal
==============================================
 
Content of fixlist:
*****************
start
HKU\S-1-5-21-156000408-1667873382-2985492148-1001\...\MountPoints2: {3dc14705-2566-11e4-be9e-c4d9872b6253} - "I:\VZW_Software_upgrade_assistant.exe"
SearchScopes: HKLM -> DefaultScope {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJB
SearchScopes: HKLM -> {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJB
SearchScopes: HKLM-x32 -> DefaultScope {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJB
SearchScopes: HKLM-x32 -> {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = http://www.bing.com/search?q={searchTerms}&form=IE10TR&src=IE10TR&pc=DCJB
SearchScopes: HKU\S-1-5-21-156000408-1667873382-2985492148-1001 -> DefaultScope {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = 
SearchScopes: HKU\S-1-5-21-156000408-1667873382-2985492148-1001 -> {5256CF85-6C52-41E4-9CCE-28BCED1CA5F6} URL = 
S2 0242031416798932mcinstcleanup; C:\Users\John\AppData\Local\Temp\024203~1.EXE [836168 2014-03-13] (McAfee, Inc.)
S4 mfefire; "C:\Program Files\Common Files\McAfee\SystemCore\\mfefire.exe" [X]
C:\Program Files\Common Files\McAfee
S2 mfevtp; "C:\Windows\system32\mfevtps.exe" [X]
S0 cfwids; system32\drivers\cfwids.sys [X]
S0 mfeapfk; system32\drivers\mfeapfk.sys [X]
R0 mfeavfk; system32\drivers\mfeavfk.sys [X]
S0 mfeelamk; system32\drivers\mfeelamk.sys [X]
S0 mfefirek; system32\drivers\mfefirek.sys [X]
R0 mfehidk; system32\drivers\mfehidk.sys [X]
R0 mfewfpk; system32\drivers\mfewfpk.sys [X]
S4 NvStUSB; \SystemRoot\System32\drivers\nvstusb.sys [X]
C:\ProgramData\Dell Click 2 Fix+-64-bit-V2545.exe
C:\Users\John\AppData\Local\Temp\0242031416798932mcinst.exe
C:\Users\John\AppData\Local\Temp\CreativeCloudSet-Up.exe
C:\Users\John\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmp5rk9ml.dll
C:\Users\John\AppData\Local\Temp\jre-7u67-windows-i586-iftw.exe
C:\Users\John\AppData\Local\Temp\nvSCPAPI.dll
C:\Users\John\AppData\Local\Temp\nvSCPAPI64.dll
C:\Users\John\AppData\Local\Temp\nvStInst.exe
C:\Users\John\AppData\Local\Temp\Quarantine.exe
C:\Users\John\AppData\Local\Temp\sqlite3.dll
C:\Users\John\AppData\Local\Temp\SRLDetectionLibrary7803777365940062332.dll
C:\Users\John\AppData\Local\Temp\vcredist_x64.exe
C:\Users\John\AppData\Local\Temp\vcredist_x86.exe
C:\Users\John\AppData\Local\Temp\xmlUpdater.exe
CustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{0F22A205-CFB0-4679-8499-A6F44A80A208}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.25.5\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{355EC88A-02E2-4547-9DEE-F87426484BD1}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.23.9\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{90B3DFBF-AF6A-4EA0-8899-F332194690F8}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.24.15\psuser_64.dll No File
CustomCLSID: HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{FE498BAB-CB4C-4F88-AC3F-3641AAAF5E9E}\InprocServer32 -> C:\Users\John\AppData\Local\Google\Update\1.3.24.7\psuser_64.dll No File
AlternateDataStreams: C:\ProgramData\Temp:6DAA43DB
CMD: ipconfig /flushdns
CMD: netsh winsock reset all
EmptyTemp:
end
*****************
 
"HKU\S-1-5-21-156000408-1667873382-2985492148-1001\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\{3dc14705-2566-11e4-be9e-c4d9872b6253}" => Key deleted successfully.
"HKCR\CLSID\{3dc14705-2566-11e4-be9e-c4d9872b6253}" => Key not found.
HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{5256CF85-6C52-41E4-9CCE-28BCED1CA5F6}" => Key deleted successfully.
"HKCR\CLSID\{5256CF85-6C52-41E4-9CCE-28BCED1CA5F6}" => Key not found.
HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => Value was restored successfully.
"HKLM\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\SearchScopes\{5256CF85-6C52-41E4-9CCE-28BCED1CA5F6}" => Key deleted successfully.
"HKCR\Wow6432Node\CLSID\{5256CF85-6C52-41E4-9CCE-28BCED1CA5F6}" => Key not found.
HKU\S-1-5-21-156000408-1667873382-2985492148-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\\DefaultScope => value deleted successfully.
"HKU\S-1-5-21-156000408-1667873382-2985492148-1001\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{5256CF85-6C52-41E4-9CCE-28BCED1CA5F6}" => Key deleted successfully.
"HKCR\CLSID\{5256CF85-6C52-41E4-9CCE-28BCED1CA5F6}" => Key not found.
0242031416798932mcinstcleanup => Service deleted successfully.
mfefire => Service deleted successfully.
C:\Program Files\Common Files\McAfee => Moved successfully.
mfevtp => Service deleted successfully.
cfwids => Service deleted successfully.
mfeapfk => Service deleted successfully.
mfeavfk => Unable to stop service
mfeavfk => Service deleted successfully.
mfeelamk => Service deleted successfully.
mfefirek => Service deleted successfully.
mfehidk => Unable to stop service
mfehidk => Service deleted successfully.
mfewfpk => Unable to stop service
mfewfpk => Service deleted successfully.
NvStUSB => Service deleted successfully.
C:\ProgramData\Dell Click 2 Fix+-64-bit-V2545.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\0242031416798932mcinst.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\CreativeCloudSet-Up.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\dropbox_sqlite_ext.{5f3e3153-5bce-5766-8f84-3e3e7ecf0d81}.tmp5rk9ml.dll => Moved successfully.
C:\Users\John\AppData\Local\Temp\jre-7u67-windows-i586-iftw.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\nvSCPAPI.dll => Moved successfully.
C:\Users\John\AppData\Local\Temp\nvSCPAPI64.dll => Moved successfully.
C:\Users\John\AppData\Local\Temp\nvStInst.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\Quarantine.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\sqlite3.dll => Moved successfully.
C:\Users\John\AppData\Local\Temp\SRLDetectionLibrary7803777365940062332.dll => Moved successfully.
C:\Users\John\AppData\Local\Temp\vcredist_x64.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\vcredist_x86.exe => Moved successfully.
C:\Users\John\AppData\Local\Temp\xmlUpdater.exe => Moved successfully.
"HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{0F22A205-CFB0-4679-8499-A6F44A80A208}" => Key deleted successfully.
"HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{355EC88A-02E2-4547-9DEE-F87426484BD1}" => Key deleted successfully.
"HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{90B3DFBF-AF6A-4EA0-8899-F332194690F8}" => Key deleted successfully.
"HKU\S-1-5-21-156000408-1667873382-2985492148-1001_Classes\CLSID\{FE498BAB-CB4C-4F88-AC3F-3641AAAF5E9E}" => Key deleted successfully.
C:\ProgramData\Temp => ":6DAA43DB" ADS removed successfully.
 
=========  ipconfig /flushdns =========
 
 
Windows IP Configuration
 
Successfully flushed the DNS Resolver Cache.
 
========= End of CMD: =========
 
 
=========  netsh winsock reset all =========
 
 
Sucessfully reset the Winsock Catalog.
You must restart the computer in order to complete the reset.
 
 
========= End of CMD: =========
 
EmptyTemp: => Removed 14.2 GB temporary data.
 
 
The system needed a reboot. 
 
==== End of Fixlog ====
 
 
 
 
 
Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 11/24/2014
Scan Time: 8:32:35 AM
Logfile: 
Administrator: Yes
 
Version: 2.00.3.1025
Malware Database: v2014.11.24.05
Rootkit Database: v2014.11.22.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 8.1
CPU: x64
File System: NTFS
User: John
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 353434
Time Elapsed: 4 min, 30 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 0
(No malicious items detected)
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
 
# AdwCleaner v4.102 - Report created 24/11/2014 at 08:41:15
# Updated 23/11/2014 by Xplode
# Database : 2014-11-24.1 [Live]
# Operating System : Windows 8.1  (64 bits)
# Username : John - NEWNO2
# Running from : D:\Downloads\adwcleaner_4.102.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\Users\John\AppData\Local\Google\Chrome\User Data\Default\Extensions\eofcbnmajmjmplflapaojjnihcjkigck
 
***** [ Scheduled Tasks ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\eofcbnmajmjmplflapaojjnihcjkigck
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v11.0.9600.17416
 
 
-\\ Google Chrome v39.0.2171.65
 
 
*************************
 
AdwCleaner[R0].txt - [1440 octets] - [19/11/2014 10:37:38]
AdwCleaner[R1].txt - [1037 octets] - [24/11/2014 08:38:39]
AdwCleaner[s0].txt - [1513 octets] - [19/11/2014 10:39:32]
AdwCleaner[s1].txt - [964 octets] - [24/11/2014 08:41:15]
 
########## EOF - C:\AdwCleaner\AdwCleaner[s1].txt - [1023 octets] ##########
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.3.9 (11.15.2014:2)
OS: Windows 8.1 x64
Ran by John on Mon 11/24/2014 at  8:45:29.62
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] "C:\ProgramData\pcdr"
Successfully deleted: [Folder] "C:\Users\John\AppData\Roaming\pcdr"
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Mon 11/24/2014 at  8:47:34.83
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Link to post
Share on other sites
  • Staff

Hi John, 

 

Please work your way through the following.

 

STEP 1
b8zkrsY.png Browser Reset
 
Instructions on how to backup your Favourites/Bookmarks and other data can be found below.

Proceed with the reset once done.

STEP 2
GzlsbnV.png ESET Online Scan
Note: This scan may take a long time to complete. Please do not browse the Internet whilst your Anti-Virus is disabled.

  • Please download ESET Online Scan and save the file to your Desktop.
  • Temporarily disable your anti-virus software. For instructions, please refer to the following link.
  • Double-click esetsmartinstaller_enu.exe to run the programme. 
  • Agree to the EULA by placing a checkmark next to Yes, I accept the Terms of Use. Then click Start.
  • Agree to the Terms of Use once more and click Start. Allow components to download.
  • Place a checkmark next to Enable detection of potentially unwanted applications.
  • Click Hide advanced settings. Place a checkmark next to:
    • Scan archives
    • Scan for potentially unsafe applications
    • Enable Anti-Stealth technology
  • Ensure Remove found threats is unchecked.
  • Click Start.
  • Wait for the scan to finish. Please be patient as this can take some time.
  • Upon completion, click esetListThreats.png. If no threats were found, skip the next two bullet points. 
  • Click esetExport.png and save the file to your Desktop, naming it something such as "MyEsetScan".
  • Push the Back button.
  • Place a checkmark next to xKN1w2nv.png.pagespeed.ic.JWqIaEgZi7.png and click Finish.
  • Re-enable your anti-virus software.
  • Copy the contents of the log and paste in your next reply.
     

STEP 3
xlK5Hdb.png Farbar Recovery Scan Tool (FRST) Scan

  • Right-Click FRST64.exe and select Run as administrator to run the programme.
  • Click Yes to the disclaimer.
  • Ensure the Addition.txt box is checked.
  • Click the Scan button and let the programme run.
  • Upon completion, click OK, then OK on the Addition.txt pop up screen.
  • Two logs (FRST.txt & Addition.txt) will now be open on your Desktop. Copy the contents of both logs and paste in your next reply. 
     

======================================================
 
STEP 4
pfNZP4A.png Logs
In your next reply please include the following logs. Please be sure to copy and paste the requested logs, as well as provide information on any questions I may have asked.

  • Did your browsers reset OK?
  • ESET Online Scan log
  • FRST.txt
  • Addition.txt
Link to post
Share on other sites
  • Staff

The files flagged by ESET are not threats; but setup files/installers for software installed on your computer. The reason for flagging is because these setup files bundle software considered potentially unwanted or adware. 
 
I'll let you decide if you wish to delete these files or not. There's no harm either way.

D:\Downloads\cbsidlm-cbsi188-Print_to_PDF-SEO-75945959.exe D:\Downloads\FreeFileSync_6.2_Windows_Setup.exe D:\Downloads\FreeFileSync_6.5_Windows_Setup.exe D:\Downloads\FreeFileSync_6.6_Windows_Setup.exe D:\Downloads\FreeFileSync_6.8_Windows_Setup.exeD:\Downloads\pdftoppt.exe D:\Downloads\SFInstaller_SFFZ_filezilla_8992693_.exe D:\Downloads\2013 unsorted downloads\Backup - downloads\FreeFileSync_5.15_Windows_Setup.exeD:\Downloads\2013 unsorted downloads\Backup - downloads\OFLSortsMillGoudyTT_downloader_by_Ffonts.exeD:\Downloads\2013 unsorted downloads\Backup - downloads\archived downloads 9-17-12\SetupImgBurn_2.5.7.0.exe D:\Downloads\2013 unsorted downloads\Backup - downloads\Computer Diagnostics\SetupImgBurn_2.5.6.0.exe D:\Downloads\Software\Utilities\FreeFileSync_5.15_Windows_Setup.exe F:\Backup -  Downloads\cbsidlm-cbsi188-Print_to_PDF-SEO-75945959.exe a variant of Win32/CNETInstaller.B potentially unwanted applicationF:\Backup -  Downloads\FreeFileSync_6.2_Windows_Setup.exe F:\Backup -  Downloads\FreeFileSync_6.5_Windows_Setup.exe F:\Backup -  Downloads\FreeFileSync_6.6_Windows_Setup.exe F:\Backup -  Downloads\FreeFileSync_6.8_Windows_Setup.exe F:\Backup -  Downloads\pdftoppt.exeF:\Backup -  Downloads\SFInstaller_SFFZ_filezilla_8992693_.exe F:\Backup -  Downloads\2013 unsorted downloads\Backup - downloads\FreeFileSync_5.15_Windows_Setup.exe F:\Backup -  Downloads\2013 unsorted downloads\Backup - downloads\OFLSortsMillGoudyTT_downloader_by_Ffonts.exeF:\Backup -  Downloads\2013 unsorted downloads\Backup - downloads\archived downloads 9-17-12\SetupImgBurn_2.5.7.0.exeF:\Backup -  Downloads\2013 unsorted downloads\Backup - downloads\Computer Diagnostics\SetupImgBurn_2.5.6.0.exe F:\Backup -  Downloads\Software\Utilities\FreeFileSync_5.15_Windows_Setup.exe

 
How is your computer performing? Is your browser still being redirected?

Link to post
Share on other sites
  • Staff

Hello John, 

 

We can run one last check. If all is well, I'll provide instructions on updating your vulnerable software and removing the tools we've used. 

 

mlEX1wH.png RogueKiller

  • Please download RogueKiller (x64) and save the file to your Desktop.
  • Close any running programmes.
  • Right-Click RogueKiller.exe and select AVOiBNU.jpg Run as administrator to run the programme.
  • Allow the Prescan to complete. Upon completion, a window will open. Click Accept.
  • A browser window may open. Close the browser window.
  • Click jpgUwzp.png. Upon completion, click phPvmc6.png.
  • Close the programme. Do not fix anything!
  • A log (RKreport.txt) will be open. Copy the contents of the log and paste in your next reply.
Link to post
Share on other sites

Hello Adam - 

 

Here are the results:

 

 

RogueKiller V10.0.8.0 (x64) [Nov 20 2014] by Adlice Software
 
Operating System : Windows 8.1 (6.3.9200 ) 64 bits version
Started in : Normal mode
User : John [Administrator]
Mode : Scan -- Date : 11/26/2014  11:20:55
 
¤¤¤ Processes : 0 ¤¤¤
 
¤¤¤ Registry : 5 ¤¤¤
[suspicious.Path] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run | Nvtmru : "C:\Program Files (x86)\NVIDIA Corporation\NVIDIA Update Core\nvtmru.exe"  -f "C:\ProgramData\NVIDIA\Updatus\NvTmru\nvtmru.dat"  -> Found
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> Found
[PUM.DesktopIcons] (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> Found
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {20D04FE0-3AEA-1069-A2D8-08002B30309D} : 1  -> Found
[PUM.DesktopIcons] (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel | {59031a47-3f72-44a7-89c5-5595fe6b30ee} : 1  -> Found
 
¤¤¤ Tasks : 0 ¤¤¤
 
¤¤¤ Files : 0 ¤¤¤
 
¤¤¤ Hosts File : 1 ¤¤¤
[C:\WINDOWS\System32\drivers\etc\hosts] 127.0.0.1       localhost
 
¤¤¤ Antirootkit : 2 (Driver: Loaded) ¤¤¤
[iAT:Addr] (explorer.exe @ MPR.dll) ext-ms-win-mpr-multipleproviderrouter-l1-1-0.dll - WNetConnectionDialog1WWorker : C:\WINDOWS\SYSTEM32\mprext.dll @ 0x7ffaa36211bc
[iAT:Addr] (explorer.exe @ TERACO~2.DLL) kernel32.dll - RegDeleteKeyExW : Unknown @ 0x0
 
¤¤¤ Web browsers : 0 ¤¤¤
 
¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: ST2000DM001-1CH164 +++++
--- User ---
[MBR] 07e9cb0122d571ceaa1a7510b7b33570
[bSP] 44aeffd1c399f86887a120a05c64e11a : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x0) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK
User = LL2 ... OK
 
+++++ PhysicalDrive1: ST2000DL003-9VT166 +++++
--- User ---
[MBR] 07f5335726839e90af77c9cff89d8a91
[bSP] c1d198024499c0d280d8ec23f6017460 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 1907727 MB
User = LL1 ... OK
User = LL2 ... OK
 
+++++ PhysicalDrive2: LITEONIT LMT-256M6M mSATA 256GB +++++
--- User ---
[MBR] 6cb1521760f7a0dfc8841774e1383fe7
[bSP] befee00b2d904a3acdef3dddd044f14e : Empty MBR Code
Partition table:
0 - [XXXXXX] UNKNOWN (0x0) [VISIBLE] Offset (sectors): 1 | Size: 2097152 MB
User = LL1 ... OK
User = LL2 ... OK
 
+++++ PhysicalDrive3: Kingston FCR-HS219/1 USB Device +++++
Error reading User MBR! ([15] The device is not ready. )
Error reading LL1 MBR! NOT VALID!
Error reading LL2 MBR! ([32] The request is not supported. )
 
+++++ PhysicalDrive4: Kingston FCR-HS219/1 USB Device +++++
Error reading User MBR! ([15] The device is not ready. )
Error reading LL1 MBR! NOT VALID!
Error reading LL2 MBR! ([32] The request is not supported. )
 
+++++ PhysicalDrive5: Kingston FCR-HS219/1 USB Device +++++
Error reading User MBR! ([15] The device is not ready. )
Error reading LL1 MBR! NOT VALID!
Error reading LL2 MBR! ([32] The request is not supported. )
 
+++++ PhysicalDrive6: Kingston FCR-HS219/1 USB Device +++++
Error reading User MBR! ([15] The device is not ready. )
Error reading LL1 MBR! NOT VALID!
Error reading LL2 MBR! ([32] The request is not supported. )
Link to post
Share on other sites
  • Staff

That log looks good, John. 
 
Please uninstall: Java 7 Update 67 
 
----------------
 
Now for the good news!
 
All Clean!
Congratulations, your computer appears clean!  :)
I no longer see signs of malware on your computer, and feel satisfied that our work here is done. The steps below will remove the tools we have used, and reset any settings changed. I have also provided a list of resources and tools that you may find useful
 
My help will always be free. But if you are happy with the help provided, and would like to support my fight against malware and/or buy me a beer, please consider a donation. YSCcjW7.png
 
AFZxnZc.jpg DelFix

  • Please download DelFix and save the file to your Desktop.
  • Double-click DelFix.exe to run the programme.
  • Place a checkmark next to the following items:
    • Activate UAC
    • Remove disinfection tools
    • Create registry backup
    • Purge system restore
    • Reset system settings
  • Click the Run button.

-- This will remove the specialised tools we used to disinfect your system. Any leftover logs, files, folders or tools remaining on your Desktop which were not removed can be deleted manually (right-click the file + delete).
 
======================================================
 
I have compiled below a list of resources you may find useful. The articles document information on computer security, common infection vectors and how you can stay safe on the Internet.

The following programmes come highly recommended in the security community.

  • xKsUqI5A.png.pagespeed.ic.vn1Hlvqi8h.jpg AdBlock is a browser add-on that blocks annoying banners, pop-ups and video ads.
  • E8I37RF.pngCryptoPrevent places policy restrictions on loading points for ransomware (eg. CryptoWall), helping prevent the execution of malware. 
  • EG85Vjt.png Malwarebytes Anti-Exploit (MBAE) is designed to prevent zero-day malware from exploiting vulnerable software.
  • x6YRrgUC.png.pagespeed.ic.HjgFxjvw2Z.jpg Malwarebytes Anti-Malware Premium (MBAM) works in real-time along side your Anti-Virus to prevent malware execution.
  • xjv4nhMJ.png.pagespeed.ic.A5YbWn1eDO.png NoScript is a Firefox add-on that blocks the actions of malicious scripts by using whitelisting and other technology.
  • 3O8r9Uq.png Sandboxie isolates programmes of your choice, preventing files from being written to your HDD unless approved by you.
  • DgW1XL2.png.pagespeed.ce.v1OlJl_ZAS.png Secunia PSI will scan your computer for vulnerable software that is outdatedand automatically find the latest update for you.
  • xj1OLIec.png.pagespeed.ic.k6hhwopU0q.jpg SpywareBlaster is a form of passive protection, designed to block the actions of malicious websites and tracking cookies.
  • xJEP5iWI.png.pagespeed.ic.4tmM1lM7DQ.png Web of Trust (WOT) is a browser add-on designed to alert you before interacting with a potentially malicious website.

-- Please feel free to ask if you have any questions or concerns on computer security or the programmes above.
 
======================================================
 
Please confirm you have no outstanding issues, and are happy with the state of your computer. Once I have confirmation things are in order, we can wrap things up and I will close this thread. 
 
Thank you for using Malwarebytes.
 
Safe Surfing. :)    
Adam

Link to post
Share on other sites
  • Root Admin

Glad we could help. :)

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.

Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.