Jump to content

Can't beat Adw ChinAd


Recommended Posts

Hello,

 

so I've tried pretty much everything I know by now but even after Malwarebytes finally realized there's ChinAd on my pc and deleted it, the same symptoms still occur. These are: IE is slowed down, often breaks down, and the adware replaces normal ads with clickbaity ones. Sadly I'm using a German pc but can't find help on German boards. Anyone willing to try to help me despite it? Please. I'm at my witt's end. I'm using Win 10.

 

Here's my latest MW-Log:

Malwarebytes
www.malwarebytes.com

-Protokolldetails-
Scan-Datum: 04.03.17
Scan-Zeit: 02:34
Protokolldatei: LOGS MALWAREBYTES.txt
Administrator: Ja

-Softwaredaten-
Version: 3.0.6.1469
Komponentenversion: 1.0.50
Version des Aktualisierungspakets: 1.0.1422
Lizenz: Testversion

-Systemdaten-
Betriebssystem: Windows 10
CPU: x64
Dateisystem: NTFS
Benutzer: System

-Scan-Übersicht-
Scan-Typ: Bedrohungs-Scan
Ergebnis: Abgeschlossen
Gescannte Objekte: 443111
Abgelaufene Zeit: 4 Min., 15 Sek.

-Scan-Optionen-
Speicher: Aktiviert
Start: Aktiviert
Dateisystem: Aktiviert
Archive: Aktiviert
Rootkits: Deaktiviert
Heuristik: Aktiviert
PUP: Aktiviert
PUM: Aktiviert

-Scan-Details-
Prozess: 0
(keine bösartigen Elemente erkannt)

Modul: 0
(keine bösartigen Elemente erkannt)

Registrierungsschlüssel: 0
(keine bösartigen Elemente erkannt)

Registrierungswert: 0
(keine bösartigen Elemente erkannt)

Registrierungsdaten: 0
(keine bösartigen Elemente erkannt)

Daten-Stream: 0
(keine bösartigen Elemente erkannt)

Ordner: 1
Adware.ChinAd, C:\USERS\YANNIE\APPDATA\LOCAL\TEMP\DMR, Keine Aktion durch Benutzer, [1417], [375557],1.0.1422

Datei: 2
Adware.ChinAd, C:\USERS\YANNIE\APPDATA\LOCAL\TEMP\DMR\ASBRVKFRNGLVRFQH.DAT, Keine Aktion durch Benutzer, [1417], [375557],1.0.1422
Adware.ChinAd, C:\Users\Yannie\AppData\Local\Temp\DMR\dmr_72.exe, Keine Aktion durch Benutzer, [1417], [375557],1.0.1422

Physischer Sektor: 0
(keine bösartigen Elemente erkannt)


(end)

 

Link to post
Share on other sites

I've used an English MW Version now. Sorry for complicating things.

 

Here's my latest MW-Log:

Malwarebytes
www.malwarebytes.com


Scan Date: 04.03.17
Scan Time: 02:34
Logfile: LOGS MALWAREBYTES.txt
Administrator: YES


OS: Windows 10
CPU: x64
File-System: NTFS
User: System


Scan-Typ: Threat-Scan

Result: Completed
Objects Scanned: 443111
Time Elapsed: 4 min., 15 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 

Files: 1
Adware.ChinAd, C:\USERS\YANNIE\APPDATA\LOCAL\TEMP\DMR, [1417], [375557],1.0.1422

Files: 2
Adware.ChinAd, C:\USERS\YANNIE\APPDATA\LOCAL\TEMP\DMR\ASBRVKFRNGLVRFQH.DAT, [1417], [375557],1.0.1422
Adware.ChinAd, C:\Users\Yannie\AppData\Local\Temp\DMR\dmr_72.exe, [1417], [375557],1.0.1422

 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)

 

 

Edited by pumpkinpot
Link to post
Share on other sites

  • Root Admin

Hello @pumpkinpot

Please run the following for me..

Please download Malwarebytes Anti-Rootkit from HERE
If needed there is a self help tutorial here: MBAR tutorial

  • Unzip the contents to a folder in a convenient location.
  • Open the folder where the contents were unzipped and run mbar.exe
  • Follow the instructions in the wizard to update and allow the program to scan your computer for threats.
  • Click on the Cleanup button to remove any threats and reboot if prompted to do so.
  • Wait while the system shuts down and the cleanup process is performed.
  • Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click Cleanup once more and repeat the process.
  • When done, please post the two logs produced they will be in the MBAR folder... mbar-log.txt and system-log.txt

 

Link to post
Share on other sites

  • 3 weeks later...
  • Root Admin

Please Run TFC by OldTimer to clear temporary files:

  • Download TFC from here and save it to your desktop.
  • http://oldtimer.geekstogo.com/TFC.exe
  • Close any open programs and Internet browsers.
  • Double click TFC.exe to run it on XP (for Vista and Windows 7 right click and choose "Run as administrator") and once it opens click on the Start button on the lower left of the program to allow it to begin cleaning.
  • Please be patient as clearing out temp files may take a while.
  • Once it completes you may be prompted to restart your computer, please do so.
  • Once it's finished you may delete TFC.exe from your desktop or save it for later use for the cleaning of temporary files.

 

Then restart the computer and run the following steps and post back the logs as attachments when ready.

STEP 01
Please download Junkware Removal Tool to your desktop.

  • Shutdown your antivirus to avoid any conflicts.
  • Right click over JRT.exe and select Run as administrator on Windows Vista or Windows 7, double-click on XP.
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next reply message
  • When completed make sure to re-enable your antivirus

STEP 02

adwcleaner_new.png Fix with AdwCleaner

Please download AdwCleaner by Xplode and save the file to your Desktop.

  • Right-click on adwcleaner_new.png icon and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now.
  • After reboot, logfile will be opened. Copy its content into your next reply.

Note: Reports will be saved in your system partition, usually at C:\Adwcleaner

STEP 03
Download Sophos Free Virus Removal Tool and save it to your desktop.
 

  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View Log file (bottom left-hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found, please confirm that result.

STEP 04
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Link to post
Share on other sites

JRT-log:

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.2 (03.10.2017)
Operating System: Windows 10 Enterprise x64
Ran by Hobbez (Administrator) on 02.04.2017 at 17:43:21,58
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 


File System: 0

 


Registry: 0

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 02.04.2017 at 17:44:02,96
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

 

(Other logs coming soon)

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.