Jump to content

keeps crashing when i try to remove bad malware


Recommended Posts

HELP

I recently downloaded some software off the internet and it gave me the following viruses:

Version: 2.2.1.1043
Malware Database: v2017.03.21.01
Rootkit Database: v2017.03.11.01
License: Premium
Malware Protection: Enabled
Malicious Website Protection: Enabled
Self-protection: Disabled

OS: Windows 10
CPU: x64
File System: NTFS
User: samho
(No malicious items detected)

Folders: 5
Trojan.Clicker, C:\Users\samho\AppData\Local\Temp\20170321, , [c9dce0ec456390a6d81d760755ac7f81], 
PUP.Optional.Amonetize, C:\ProgramData\1490060700, , [a6ff1daf7f2967cfee0fb6350ff4ee12], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\content, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\META-INF, , [d1d44f7d45636bcb0337a8af887804fc], 

Files: 24
Adware.Yelloader, C:\Program Files (x86)\qdcomsvc\wkzwqj.exe, , [adf85c708d1b7cba7da7681005fc956b], 
Rootkit.Agent.PUA, C:\Windows\System32\drivers\drmkpro64.sys, , [ced767659117da5c657e62a4e71b6997], 
PUP.Optional.AnonymizerGadget, C:\Users\samho\AppData\Local\Temp\AnonymizerGadgetSetup.1.000.1680.exe, , [3471933956520b2b38336c150bf515eb], 
Backdoor.Bot, C:\Users\samho\AppData\Local\Temp\setup.exe, , [b7ee3b919711ab8bff4dce02fc054ab6], 
Adware.Yelloader, C:\Users\samho\AppData\Local\Temp\1490060700\s5-20150702.exe, , [4b5a4f7d1692ee483e67ea8ed32ed12f], 
Adware.Yelloader, C:\Users\samho\AppData\Local\Temp\1490060700\s5-20150702.zip, , [95100ebe8a1e2f0782237008fd047b85], 
Adware.Yelloader, C:\Users\samho\AppData\Local\Temp\20170321\ct.exe, , [c7deefdd2b7d1b1bae6f1c616a97af51], 
Rootkit.Agent.PUA, C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\drmkpro64.sys-k.mbam, , [01a4c9035c4cf83ec41fe4226c9640c0], 
Rootkit.Agent.PUA, C:\ProgramData\Malwarebytes\Malwarebytes Anti-Malware\drmkpro64.sys-u.mbam, , [acf9f4d87830e84e5b88c73fb9498977], 
PUP.Optional.Yontoo, C:\Users\samho\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.coupontime00.coupontime.co_0.localstorage, , [b5f0ffcd5c4c142245ba2fd18d73b749], 
PUP.Optional.Yontoo, C:\Users\samho\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.coupontime00.coupontime.co_0.localstorage-journal, , [3d68676500a872c4aa55ff0128d8748c], 
Trojan.Clicker, C:\Users\samho\AppData\Local\Temp\20170321\ct.zip, , [c9dce0ec456390a6d81d760755ac7f81], 
PUP.Optional.Amonetize, C:\ProgramData\1490060700\s9.zip.dl, , [a6ff1daf7f2967cfee0fb6350ff4ee12], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\0024397e, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\chrome.manifest, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\install.rdf, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\content\browser.xul, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\content\content.js, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\content\icon-48.png, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\content\icon-64.png, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\META-INF\manifest.mf, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\META-INF\mozilla.rsa, , [d1d44f7d45636bcb0337a8af887804fc], 
PUP.Optional.FastSearch, C:\Users\samho\AppData\Roaming\Mozilla\Firefox\Profiles\rubnuier.default\extensions\amcontextmenu@loucypher\META-INF\mozilla.sf, , [d1d44f7d45636bcb0337a8af887804fc], 
Hijack.HostFile, C:\Windows\System32\drivers\etc\hosts, Good: (), Bad: (127.0.0.1 clients2.google.com ), ,[4a5b6f5dabfd1c1ab6b497bba55b9967]

Whenever I try to remove them my computer crashes.

I have to bring it to school please help

Link to post
Share on other sites

Heloo Sam1423 and welcome to Malwarebytes,

My screen name is kevinf80, i`m here to help clean up your system. Make sure to run all scans from accounts with Administrator status, continue as follows please:

Anyone other than the original starter of this thread please DO NOT follow the instructions and advice posted as replies here, my help and advice is NOT related to your system and will probably cause more harm than good...

Change the download folder setting in the Default Browser only. so all of the tools we may use are saved to the Desktop:

user posted imageGoogle Chrome - Click the "Customize and control Google Chrome" button in the upper right-corner of the browser. user posted image
Choose Settings. at the bottom of the screen click the
"Show advanced settings..." link. Scroll down to find the Downloads section and click the Change... button. Select your desktop and click OK.

user posted imageMozilla Firefox - Click the "Open Menu" button in the upper right-corner of the browser. user posted image Choose Options. In the downloads section, click the Browse button, click on the Desktop folder and the click the "Select Folder" button. Click OK to get out of the Options menu.

user posted imageInternet Explorer - Click the Tools menu in the upper right-corner of the browser. user posted image Select View downloads. Select the Options link in the lower left of the window. Click Browse and select the Desktop and then choose the Select Folder button. Click OK to get out of the download options screen and then click Close to get out of the View Downloads screen.
NOTE: IE8 Does not support changing download locations in this manner. You will need to download the tool(s) to the default folder, usually Downloads, then copy them to the desktop.

user posted imageChange default download folder location in Edge -Boot to a user account with admin status, select start > file explorer > right click on "Downloads" folder and select "Properties"

In the new window select "Location" tab > clear the text field box and type in or copy/paste %userprofile%\Desktop > select "Apply" then "OK"

Be aware you are not changing the Browser download folder location, you are changing the user’s download directory location.....

Next,

Follow the instructions in the following link to show hidden files:

http://www.howtogeek.com/howto/windows-vista/show-hidden-files-and-folders-in-windows-vista/

Next,

1.Download Malwarebytes Anti-Rootkit from this link:

http://www.malwarebytes.org/products/mbar/

2. Unzip the File to a convenient location. (Recommend the Desktop)
3. Open the folder where the contents were unzipped to run mbar.exe

user posted image

4. Double-click on the mbar.exe file, you may receive a User Account Control prompt asking if you are sure you wish to allow the program to run. Please allow the program to run and MBAR will now start to install any necessary drivers that are required for the program to operate correctly. If a rootkit is interfering with the installation of the drivers you will see a message that states that the DDA driver was not installed and that you should reboot your computer to install it. You will see this image:

user posted image

5. If you receive this message, please click on the Yes button and Malwarebytes Anti-Rootkit will now restart your computer. Once the computer is rebooted and you login, MBAR will automatically start and you will now be at the start screen. (If no Rootkit warning you will go from step 4 to 6.)

6. The following image opens, select Next.

user posted image

7. The following image opens, select Update

user posted image

8. When the update completes select Next.

user posted image

9. In the following window ensure "Targets" are ticked. Then select "Scan"

user posted image

10. If an infection is found select the "Cleanup Button" to remove threats, Reboot if prompted. Wait while the system shuts down and the cleanup process is performed.

user posted image

11. Perform another scan with Malwarebytes Anti-Rootkit to verify that no threats remain. If they do, then click "Cleanup Button" once more and repeat the process.
12. If no threats were found you will see the following image, Select Exit:

user posted image

13. Verify that your system is now running normally, making sure that the following items are functional:
 
  • Internet access
  • Windows Update
  • Windows Firewall


14. If there are additional problems with your system, such as any of those listed above or other system issues, then run the 'fixdamage' tool included within Malwarebytes Anti-Rootkit folder.

15. Select "Y" from your Keyboard, tap Enter.

16. The fix will be applied, select any key to Exit.

17. Let me know how your system now responds. Copy and paste the two following logs from the mbar folder:

System - log
Mbar - log Date and time of scan will also be shown

Next,

Download Farbar Recovery Scan Tool and save it to your desktop.

Alternative download option: http://www.techspot.com/downloads/6731-farbar-recovery-scan-tool.html

Note: You need to run the version compatible with your system (32 bit or 64 bit). If you are not sure which version applies to your system download both of them and try to run them. Only one of them will run on your system, that will be the right version.

If your security alerts to FRST either, accept the alert or turn your security off to allow FRST to run. It is not malicious or infected in any way...

Be aware FRST must be run from an account with Administrator status...
 
  • Double-click to run it. When the tool opens click Yes to disclaimer.(Windows 8/10 users will be prompted about Windows SmartScreen protection - click More information and Run.)
  • Make sure Addition.txt is checkmarked under "Optional scans"
  • Press Scan button to run the tool....
  • It will make a log (FRST.txt) in the same directory the tool is run. Please copy and paste it to your reply.
  • The tool will also make a log named (Addition.txt) Please attach that log to your reply.


Let me see those logs in your reply...

Thanks,

Kevin...
Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.