Jump to content

Fake Firefox Patch


echo3033

Recommended Posts

I get a dialog like the following every few days:

The website varies but the javascript file is always about 2.5 KB.  This dialog comes with a new (orange) Firefox tab indicating an urgent patch is required.

When I see this dialog, I use Task Manager to end the Firefox process and the dialog goes away.

I have run MSE, MBAM (with rootkit) and ADWCleaner.  All show no infections.  I read the other posts on this matter and did not see a resolution.  Thanks.

Link to post
Share on other sites

  • Root Admin

Hello @echo3033 and :welcome:

Please read the following and post back the logs when ready and we'll see about getting you cleaned up.

Before we proceed further, please read all of the following instructions carefully.
If there is anything that you do not understand kindly ask before proceeding.
If needed, please print out these instructions.

  • Please do not post logs using CODE, QUOTE, or FONT tags. Just paste them as direct text.
  • If the log is too large, then you can use attachments by clicking on the More Reply Options button.
  • Please enable your system to show hidden files: How to see hidden files in Windows
  • Make sure you're subscribed to this topic:
  • Click on the Follow This Topic Button (at the top right of this page), make sure that the Receive notification box is checked and that it is set to Instantly
  • Removing malware can be unpredictable, it is unlikely, but things can go very wrong! Please make sure you Backup all files that cannot be replaced if something were to happen. You can copy them to a CD/DVD, external drive or a pen drive
  • Please don't run any other scans, download, install or uninstall any programs unless requested by me while I'm working with you.
  • The removal of malware is not instantaneous; please be patient. Often we are also in a different Time Zone.
  • Perform everything in the correct order. Sometimes one step requires the previous one.
  • If you have any problems while following my instructions, Stop there and tell me the exact nature of the issue.
  • You can check here if you're not sure if your computer is 32-bit or 64-bit
  • Please disable your antivirus while running any requested scanners so that they do not interfere with the scanners.
  • When we are done, I'll give you instructions on how to clean up all the tools and logs
  • Please stick with me until I give you the "all clear" and Please don't waste my time by leaving before that.
  • Your topic will be closed if you haven't replied within 3 days
  • (If I have not responded within 24 hours, please send me a Private Message as a reminder)

STEP 01
RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections.
When RKill runs, it will kill malware processes and then removes incorrect executable associations and fixes policies
that stop us from using certain tools. When finished it will display a log file that shows the processes that were
terminated while the program was running.

As RKill only terminates a program's running process and does not delete any files, after running it, you should not reboot
your computer as any malware processes that are configured to start automatically will just be started again.
Instead, after running RKill, you should immediately scan your computer using the requested scans I've included.

Please download Rkill by Grinler from one of the links below and save it to your desktop.

Link 1 | Link 2

  • On Windows XP Double-click on the Rkill desktop icon to run the tool.
  • On Windows Vista/Windows 7 or 8, right-click on the Rkill desktop icon and select Run As Administrator
  • A black DOS box will briefly flash and then disappear, this is normal and indicates the tool ran successfully.
  • If not, delete the file, then download and use the one provided in Link 2.
  • If it does not work, repeat the process and attempt to use one of the remaining links until the tool runs.
  • If the tool does not run from any of the links provided, please let me know.
  • Do not reboot the computer; you will need to run the application again.

STEP 02
Backup the Registry:
Modifying the Registry can create unforeseen problems, so it's always wise to create a backup before doing so.

  • Please download ERUNT from one of the following links: Link1 | Link2 | Link3
  • ERUNT (Emergency Recovery Utility NT) is a free program that allows you to keep a complete backup of your registry and restore it when needed.
  • Double click on erunt-setup.exe to Install ERUNT by following the prompts.
  • NOTE: Do not choose to allow ERUNT to add an Entry to the Startup folder. Click NO.
  • Start ERUNT either by double-clicking on the desktop icon or choosing to start the program at the end of the setup process.
  • Choose a location for the backup.
    • Note: the default location is C:\Windows\ERDNT which is acceptable.
  • Make sure that at least the first two check boxes are selected.
  • Click on OK
  • Then click on YES to create the folder.
  • Note: if it is necessary to restore the registry, open the backup folder and start ERDNT.exe

STEP 03
Please run a Threat Scan with MBAM. If you're unable to run or complete the scan as shown below, please see the following:
MBAM Clean Removal Process 2x
When reinstalling the program, please try the latest version.

Right click and choose "Run as administrator" to open Malwarebytes Anti-Malware and from the Dashboard please Check for Updates by clicking the Update Now... link
Open up Malwarebytes > Settings > Detection and Protection > Enable Scan for rootkit and Under Non Malware Protection set both PUP and PUM to Treat detections as malware.
Click on the SCAN button and run a Threat Scan with Malwarebytes Anti-Malware by clicking the Scan Now>> button.
Once completed please click on the History > Application Logs and find your scan log and open it and then click on the "copy to clipboard" button and post back the results on your next reply.

Link to post
Share on other sites

Rkill 2.8.4 by Lawrence Abrams (Grinler)

Program started at: 09/13/2016 02:16:44 PM in x64 mode.
Windows Version: Windows 7 Home Premium Service Pack 1

Checking for Windows services to stop:

 * No malware services found to stop.

Checking for processes to terminate:

 * No malware processes found to kill.

Checking Registry for malware related settings:

 * No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

 * No issues found.

Checking Windows Service Integrity:

 * TBS [Missing Service]

Searching for Missing Digital Signatures:

 * No issues found.

Checking HOSTS File:

 * No issues found.

Program finished at: 09/13/2016 02:18:33 PM
Execution time: 0 hours(s), 1 minute(s), and 48 seconds(s)

 

Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 9/13/2016
Scan Time: 2:39 PM
Logfile:
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.09.13.13
Rootkit Database: v2016.08.15.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Bill

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 405830
Time Elapsed: 32 min, 14 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Folders: 0
(No malicious items detected)

Files: 0
(No malicious items detected)

Physical Sectors: 0
(No malicious items detected)


(end)

 

Thanks for taking my case!  Echo

Link to post
Share on other sites

  • Root Admin

Please restart the computer first and then run the following steps and post back the logs when ready.

Please make sure to ATTACH all logs unless otherwise requested.

STEP 04
Please download Junkware Removal Tool to your desktop.

  • Shutdown your antivirus to avoid any conflicts.
  • Right click over JRT.exe and select Run as administrator on Windows Vista or Windows 7, double-click on XP.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next reply message
  • When completed make sure to re-enable your antivirus

STEP 05
Let's clean out any adware now: (this will require a reboot so save all your work)

Please download AdwCleaner by Xplode and save to your Desktop.

  • Double click on AdwCleaner.exe to run the tool.
    Vista / Windows 7/8 users right-click and select Run As Administrator
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • When it's done, you'll see: Pending: Please uncheck elements you don't want to be removed.
  • Now click on the Report button and a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • Look at the log especially under Files/Folders for any program you want to save.
  • If there's a program you may want to save, just uncheck it from AdwCleaner.
  • If you're not sure, post the log for review. (all items found are adware/spyware/foistware)
  • If you're ready to clean it all up, click the Clean button.
  • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of that logfile will also be saved in the C:\AdwCleaner folder.
  • Items that are deleted are moved to the Quarantine Folder: C:\AdwCleaner\Quarantine
  • To restore an item that has been deleted:
  • Go to Tools > Quarantine Manager > check what you want to be restored > now click on Restore.

STEP 06
Download Sophos Free Virus Removal Tool and save it to your desktop.
 

  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View Log file (bottom left-hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found, please confirm that result.

STEP 07
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Link to post
Share on other sites

# AdwCleaner v6.010 - Logfile created 14/09/2016 at 09:42:31
# Updated on 12/08/2016 by ToolsLib
# Database : 2016-09-13.1 [Server]
# Operating System : Windows 7 Home Premium Service Pack 1 (X64)
# Username : Bill - BILL-PC
# Running from : C:\Users\Bill\Downloads\AdwCleaner.exe
# Mode: Scan


***** [ Services ] *****

No malicious services found.


***** [ Folders ] *****

No malicious folders found.


***** [ Files ] *****

No malicious files found.


***** [ DLL ] *****

No malicious DLLs found.


***** [ WMI ] *****

No malicious keys found.


***** [ Shortcuts ] *****

No infected shortcut found.


***** [ Scheduled Tasks ] *****

No malicious task found.


***** [ Registry ] *****

No malicious registry entries found.


***** [ Web browsers ] *****

No malicious Firefox based browser items found.
No malicious Chromium based browser items found.

*************************

C:\AdwCleaner\AdwCleaner[S0].txt - [990 Bytes] - [14/09/2016 09:42:31]

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [1062 Bytes] ##########

 

2016-09-14 16:00:34.871 Sophos Virus Removal Tool version 2.5.6
2016-09-14 16:00:34.871 Copyright (c) 2009-2016 Sophos Limited. All rights reserved.

2016-09-14 16:00:34.871 This tool will scan your computer for viruses and other threats. If it finds any, it will give you the option to remove them.

2016-09-14 16:00:34.871 Windows version 6.1 SP 1.0 Service Pack 1 build 7601 SM=0x300 PT=0x1 WOW64
2016-09-14 16:00:34.871 Checking for updates...
2016-09-14 16:00:35.295 Update progress: proxy server not available
2016-09-14 16:00:41.735 Option all = no
2016-09-14 16:00:41.735 Option recurse = yes
2016-09-14 16:00:41.735 Option archive = no
2016-09-14 16:00:41.735 Option service = yes
2016-09-14 16:00:41.735 Option confirm = yes
2016-09-14 16:00:41.735 Option sxl = yes
2016-09-14 16:00:41.737 Option max-data-age = 35
2016-09-14 16:00:41.737 Option vdl-logging = yes
2016-09-14 16:00:41.740 Customer ID: 094260ca9b3af99f9d4a3909fc47a743
2016-09-14 16:00:41.740 Machine ID: 39f7b368d8504aa8bd1c98f4f58bcd75
2016-09-14 16:00:41.741 Component SVRTcli.exe version 2.5.6
2016-09-14 16:00:41.741 Component control.dll version 2.5.6
2016-09-14 16:00:41.741 Component SVRTservice.exe version 2.5.6
2016-09-14 16:00:41.741 Component engine\osdp.dll version 1.44.1.2252
2016-09-14 16:00:41.742 Component engine\veex.dll version 3.65.2.2252
2016-09-14 16:00:41.742 Component engine\savi.dll version 9.0.1.2252
2016-09-14 16:00:41.742 Component rkdisk.dll version 1.5.30.0
2016-09-14 16:00:41.742 Version info: Product version 2.5.6
2016-09-14 16:00:41.742 Version info: Detection engine 3.65.2
2016-09-14 16:00:41.742 Version info: Detection data 5.31
2016-09-14 16:00:41.742 Version info: Build date 9/6/2016
2016-09-14 16:00:41.742 Version info: Data files added 185
2016-09-14 16:00:41.742 Version info: Last successful update (not yet updated)
2016-09-14 16:01:54.656 Downloading updates...
2016-09-14 16:01:54.657 Update progress: [I96736] sdds.svrt_10: adding primary package C1A903B2-E63E-483b-982D-04BB9C457C60 RECOMMENDED baseVersion=1
2016-09-14 16:01:54.657 Update progress: [I95020] sdds.svrt_10: looking for packages included from product C1A903B2-E63E-483b-982D-04BB9C457C60 RECOMMENDED path=
2016-09-14 16:01:54.657 Update progress: [I22529] sdds.svrt_10: looking for supplements included from product C1A903B2-E63E-483b-982D-04BB9C457C60 RECOMMENDED path=
2016-09-14 16:01:54.657 Update progress: [I49502] sdds.savi0910.xml: found supplement SAVIW32 LATEST path= baseVersion= [included from product C1A903B2-E63E-483b-982D-04BB9C457C60 RECOMMENDED path=]
2016-09-14 16:01:54.657 Update progress: [I95020] sdds.savi0910.xml: looking for packages included from product SAVIW32 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I22529] sdds.savi0910.xml: looking for supplements included from product SAVIW32 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I49502] sdds.data0910.xml: found supplement IDE532 LATEST path= baseVersion= [included from product SAVIW32 LATEST path=]
2016-09-14 16:01:54.657 Update progress: [I95020] sdds.data0910.xml: looking for packages included from product IDE532 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I22529] sdds.data0910.xml: looking for supplements included from product IDE532 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I49502] sdds.data0910.xml: found supplement IDE533 LATEST path= baseVersion= [included from product IDE532 LATEST path=]
2016-09-14 16:01:54.657 Update progress: [I95020] sdds.data0910.xml: looking for packages included from product IDE533 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I22529] sdds.data0910.xml: looking for supplements included from product IDE533 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I49502] sdds.data0910.xml: found supplement IDE534 LATEST path= baseVersion= [included from product IDE533 LATEST path=]
2016-09-14 16:01:54.657 Update progress: [I95020] sdds.data0910.xml: looking for packages included from product IDE534 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I22529] sdds.data0910.xml: looking for supplements included from product IDE534 LATEST path=
2016-09-14 16:01:54.657 Update progress: [I19463] Syncing product C1A903B2-E63E-483b-982D-04BB9C457C60 RECOMMENDED path=
2016-09-14 16:01:54.831 Update progress: [I19463] Syncing product SAVIW32 LATEST path=
2016-09-14 16:01:54.831 Update progress: [I19463] Product download size 151406551 bytes
2016-09-14 16:01:55.976 Update progress: [I19463] Syncing product IDE532 LATEST path=
2016-09-14 16:01:55.976 Update progress: [I19463] Product download size 1832805 bytes
2016-09-14 16:01:56.121 Update progress: [I19463] Syncing product IDE533 LATEST path=
2016-09-14 16:01:56.121 Update progress: [I19463] Product download size 559613 bytes
2016-09-14 16:01:56.143 Update progress: [I19463] Syncing product IDE534 LATEST path=
2016-09-14 16:01:56.263 Installing updates...
2016-09-14 16:01:56.867 Error level 1
2016-09-14 16:02:35.869 Update successful
2016-09-14 16:02:57.268 Option all = no
2016-09-14 16:02:57.268 Option recurse = yes
2016-09-14 16:02:57.268 Option archive = no
2016-09-14 16:02:57.268 Option service = yes
2016-09-14 16:02:57.268 Option confirm = yes
2016-09-14 16:02:57.268 Option sxl = yes
2016-09-14 16:02:57.269 Option max-data-age = 35
2016-09-14 16:02:57.269 Option vdl-logging = yes
2016-09-14 16:02:57.271 Customer ID: 094260ca9b3af99f9d4a3909fc47a743
2016-09-14 16:02:57.271 Machine ID: 39f7b368d8504aa8bd1c98f4f58bcd75
2016-09-14 16:02:57.272 Component SVRTcli.exe version 2.5.6
2016-09-14 16:02:57.272 Component control.dll version 2.5.6
2016-09-14 16:02:57.272 Component SVRTservice.exe version 2.5.6
2016-09-14 16:02:57.272 Component engine\osdp.dll version 1.44.1.2252
2016-09-14 16:02:57.272 Component engine\veex.dll version 3.65.2.2252
2016-09-14 16:02:57.272 Component engine\savi.dll version 9.0.1.2252
2016-09-14 16:02:57.272 Component rkdisk.dll version 1.5.30.0
2016-09-14 16:02:57.272 Version info: Product version 2.5.6
2016-09-14 16:02:57.273 Version info: Detection engine 3.65.2
2016-09-14 16:02:57.273 Version info: Detection data 5.31
2016-09-14 16:02:57.273 Version info: Build date 9/6/2016
2016-09-14 16:02:57.273 Version info: Data files added 185
2016-09-14 16:02:57.273 Version info: Last successful update 9/14/2016 10:02:35 AM

2016-09-14 16:33:24.538 Could not open C:\hiberfil.sys
2016-09-14 16:37:24.031 Could not open C:\pagefile.sys
2016-09-14 16:56:36.282 Could not open C:\System Volume Information\{2f68cf30-77d4-11e6-ad36-00027223d94d}{3808876b-c176-4e48-b7ae-04046e6cc752}
2016-09-14 16:56:36.283 Could not open C:\System Volume Information\{3808876b-c176-4e48-b7ae-04046e6cc752}
2016-09-14 16:56:36.283 Could not open C:\System Volume Information\{c39af4b5-73ce-11e6-ad05-00027223d94d}{3808876b-c176-4e48-b7ae-04046e6cc752}
2016-09-14 16:56:36.283 Could not open C:\System Volume Information\{c39af720-73ce-11e6-ad05-00027223d94d}{3808876b-c176-4e48-b7ae-04046e6cc752}
2016-09-14 16:56:36.283 Could not open C:\System Volume Information\{dd52cfd5-7a8d-11e6-accd-f04da2f76d24}{3808876b-c176-4e48-b7ae-04046e6cc752}
2016-09-14 16:56:36.283 Could not open C:\System Volume Information\{dd52d02c-7a8d-11e6-accd-f04da2f76d24}{3808876b-c176-4e48-b7ae-04046e6cc752}
2016-09-14 17:01:17.914 >>> Virus 'Mal/SEORed-A' found in file C:\Users\Bill\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\7MWHCEXZ\megafood-blood-builder-side-effects[1].htm
2016-09-14 17:07:15.512 >>> Virus 'Troj/ExpJS-HZ' found in file C:\Users\Bill\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\X3Q9769G\jovf[1].htm
2016-09-14 17:21:32.807 >>> Virus 'Troj/EncProc-K' found in file C:\Users\Bill\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\30\23beb51e-181da787
2016-09-14 17:21:38.102 >>> Virus 'Mal/JavaJar-B' found in file C:\Users\Bill\AppData\LocalLow\Sun\Java\Deployment\cache\6.0\41\f8973a9-551964ea
2016-09-14 17:31:37.630 Could not open C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb
2016-09-14 17:31:37.631 Could not open C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb
2016-09-14 17:31:46.216 Could not open C:\Windows\System32\config\components
2016-09-14 17:31:46.260 Could not open C:\Windows\System32\config\RegBack\DEFAULT
2016-09-14 17:31:46.285 Could not open C:\Windows\System32\config\RegBack\SAM
2016-09-14 17:31:46.286 Could not open C:\Windows\System32\config\RegBack\SECURITY
2016-09-14 17:31:46.287 Could not open C:\Windows\System32\config\RegBack\SOFTWARE
2016-09-14 17:31:46.288 Could not open C:\Windows\System32\config\RegBack\SYSTEM
2016-09-14 17:47:50.708 Could not open LOGICAL:0003:00000000
2016-09-14 17:47:50.725 Could not open D:\
2016-09-14 18:20:04.918 Could not open PHYSICAL:0081:0000:0000:0001
2016-09-14 18:20:05.438 The following items will be cleaned up:
2016-09-14 18:20:05.438 Mal/SEORed-A
2016-09-14 18:20:05.438 Troj/ExpJS-HZ
2016-09-14 18:20:05.438 Troj/EncProc-K
2016-09-14 18:20:05.438 Mal/JavaJar-B

JRT.txt

Addition.txt

FRST.txt

Link to post
Share on other sites

  • Root Admin

Please download the following scanner from Kaspersky and save it to your computer: TDSSkiller

Then watch the following video on how to use the tool and make sure to temporarily disable your security applications before running TDSSkiller.

PC Winvids - How to run Kaspersky TDSSKiller

If any infection is found please make sure to choose SKIP and post back the log in case of a False Positive detection.

Once the tool has completed scanning make sure to re-enable your other security applications.

 

Link to post
Share on other sites

  • Root Admin

Okay, that did not find anything. Let's try our stand alone scanner.

Please download Malwarebytes Anti-Rootkit from HERE
If needed there is a self help tutorial here: MBAR tutorial

  • Unzip the contents to a folder in a convenient location.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
  • Wait while the system shuts down and the cleanup process is performed.
  • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
  • When done, please post the two logs produced they will be in the MBAR folder... mbar-log.txt and system-log.txt

 

Link to post
Share on other sites

  • Root Admin

Let me have you run a full disk check, then reboot and run a new FRST scan.

Click on START and type in CMD.EXE and when it shows on the menu right click and select "Run as administrator"

Then type in the following and press the Enter key.

CHKDSK   C:  /R

Then press the Y key to allow it to run after a restart. Then press the Enter key and restart the computer to let it run.

Then run a new FRST scan and make sure to place a check mark in the Additions.txt check box and Attach both new logs on your next reply.

 

 

Link to post
Share on other sites

  • Root Admin

Yes the disk check is recorded in the Event Logs

On Windows XP the disk check log is in the Event Logs under Application with a heading source of  Winlogon
On Windows 7 the disk check log is in the Event Logs under Application with a heading source of  Wininit
On Windows 8 the disk check log is in the Event Logs under Application with a heading source of  Chkdsk

How to Read the Event Viewer Log for Check Disk (chkdsk) in Vista, Windows 7, and Windows 8

 

Please download the attached fixlist.txt file and save it to the Desktop.
NOTE. It's important that both files, FRST or FRST64 and fixlist.txt are in the same location or the fix will not work.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt). Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

fixlist.txt

 

Thanks to TwinHeadedEagle for pointing out where the tools were missing this entry.

 

Link to post
Share on other sites

My PC appears normal.  Sometime over the past 2 weeks of this thread my Bluetooth mouse stopped working.  Let me know if you see anything in the logs that would account for this.  It is an Apple Magic Mouse, has been running for years, and is not critical.  Perhaps the driver was stopped.

The last unwanted patch dialog was Thursday, September 15.  We need to give it another 7 days before concluding the dialog is gone.  If we could leave this thread open I will either post a new patch dialog or reply to this thread in 7 days indicating the threat is likely gone.

Thanks.  Echo

Link to post
Share on other sites

  • Root Admin

I'm not sure which entry may have stopped the Bluetooth mouse. Please try to download the latest driver from the Manufacturer website. Don't get it from some shoddy website. Then install it and let me know if that corrects the mouse issue.

I'm sure we removed the fake Firefox patch and it won't come back (unless you possibly click on some ad or popup by accident) we've also removed other unwanted items from the computer so it should be in much better shape now.

Thanks again

Ron

 

Link to post
Share on other sites

  • Root Admin

No donation necessary @echo3033 - having your computer successfully cleaned is thanks enough.

Overall the computer did not have much in the way of threats. Somehow an entry for a fake Firefox extension had gotten installed that we removed with FRST

FF Extension: (Firefox Hotfix) - C:\Users\Bill\AppData\Roaming\Mozilla\Firefox\Profiles\b6433fwe.Default User\Extensions\firefox-hotfix@mozilla.org.xpi [2016-09-11]

 

 

 

At this time there are no more signs of an infection on your system.
However if you are still seeing any signs of an infection please let me know.

Let's go ahead and remove the tools and logs we've used during this process.

Most of the tools used are potentially dangerous to use unsupervised or if ran at the wrong time.
They are often updated daily so if you went to use them again in the future they would be outdated anyways.

The following procedures will implement some cleanup procedures to remove these tools.
 
bwebb7v.jpgDownload Delfix from here and save it to your desktop. (you may already have this)

  • Ensure Remove disinfection tools is checked.
  • Click the Run button.
  • Reboot


Any other programs or logs that are still remaining, you can manually delete. (right click.....Delete)
IE: RogueKiller.exe, RKreport.txt, RK_Quarantine folder, C:\FRST folder, FRST-OlderVersion folder, MBAR folder, etc....AdwCleaner > just run the program and click uninstall.


 
If there are any other left over Folders, Files, Logs then you can delete them on your own.
 
Please visit the following link to see how to delete old System Restore Points. Please delete all of them and create a new one at this time.
How to Delete System Protection Restore Points in Windows 7 and Windows 8

Remove all but the most recent Restore Point on Windows XP


As Java seems to get exploited on a regular basis I advise not using Java if possible but to at least disable java in your web browsers
How do I disable Java in my web browser? - Disable Java

A lot of reading here but if you take the time to read a bit of it you'll see why/how infections and general damage are so easily inflicted on the computer. There is also advice on how to prevent it and keep the system working well. Don't forget about good, solid backups of your data to an external drive that is not connected except when backing up your data. If you leave a backup drive connected and you do get infected it can easily damage, encrypt, delete, or corrupt your backups as well and then you'd lose all data.
Nothing is 100% bulletproof but with a little bit of education you can certainly swing things in your favor.


If you're not currently using Malwarebytes Premium then you may want to consider purchasing the product which can also help greatly reduce the risk of a future infection.

 

Link to post
Share on other sites

  • Root Admin

Zillow is probably introducing this via advertising that they don't control. This says it's a JavaScript, not Java. they're not the same thing.

If you do have Java installed though I would recommend uninstalling it and not using it if possible.

Then run the TFC temp cleaner again and let me know if it's still happening or not.

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.