Jump to content

Browser Hijacker infection.


Recommended Posts

Hello, I recently got my computer infected with a browser hijacker. I tried removing it with MalwareBytes at first, but it didn't show up. I tried using Zemana and it did catch something, so i proceeded to delete some related keys in the registry.

This one turned out to be quite nasty, though, as it came back twice. The first time i used to get redirected to "r0.ru", i can't recall the second time, now i get redirected to sites like "start.siviewer and reimageplus", mainly while using search engines.

The Google Chrome shortcut on my desktop and taskbar got hijacked more than once, along with Internet Explorer's, I even had a fake (as in, not actually real and not installed by me) Firefox installed and showing up on my desktop at a point.

 

I don't really know how to get rid of it for good at this point: everytime i seem to be missing some files and it comes back in a couple days.

I'd really appreciate some help.

FRST log + Addition included. Thank you for your time.

 

Addition.txt

FRST.txt

Link to post
Share on other sites

Hello Germo and welcome to Malwarebytes,

My screen name is kevinf80, i`m here to help clean up your system. Make sure to run all scans from accounts with Administrator status, continue as follows please:

Anyone other than the original starter of this thread please DO NOT follow the instructions and advice posted as replies here, my help and advice is NOT related to your system and will probably cause more harm than good...


Uninstall the following ASAP

BikaQ Rss

Next,

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

Next,

Open Malwarebytes, select > "settings" > "protection tab"

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Go back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes deal with any found entries... Then select "Export Summary" then "Text File (*.txt)" name that log and save , you can copy or attach that to your reply...


Next,

Download AdwCleaner by Xplode onto your Desktop.
 
  • Double click on Adwcleaner.exe to run the tool.
  • Click on the Scan in the Actions box
  • Please wait fot the scan to finish..
  • When "Waiting for action.Please uncheck elements you want to keep" shows in top line..
  • Click on the Cleaning box.
  • Next click OK on the "Closing Programs" pop up box.
  • Click OK on the Information box & again OK to allow the necessary reboot
  • After restart the AdwCleaner(C*)-Notepad log will appear, please copy/paste it in your next reply. Where * is the number relative to list of scans completed...


Next,

Download Sophos Free Virus Removal Tool and save it to your desktop.

If your security alerts to this scan either accept the alert or turn off your security to allow Sophos to run and complete.....

Please Do Not use your PC whilst the scan is in progress.... This scan is very thorough so may take several hours...
 
  • Double click the icon and select Run
  • Click Next
  • Select I accept the terms in this license agreement, then click Next twice
  • Click Install
  • Click Finish to launch the program
  • Once the virus database has been updated click Start Scanning
  • If any threats are found click Details, then View log file... (bottom left hand corner)
  • Copy and paste the results in your reply
  • Close the Notepad document, close the Threat Details screen, then click Start cleanup
  • Click Exit to close the program
  • If no threats were found please confirm that result....



The Virus Removal Tool scans the following areas of your computer:
  • Memory, including system memory on 32-bit (x86) versions of Windows
  • The Windows registry
  • All local hard drives, fixed and removable
  • Mapped network drives are not scanned.



Note: If threats are found in the computer memory, the scan stops. This is because further scanning could enable the threat to spread. You will be asked to click Start Cleanup to remove the threats before continuing the scan.
 

Let me see those logs in your reply, also tell me if there are any remaining issues or concerns...

Thank you,

Kevin...

 

 

 

fixlist.txt

Link to post
Share on other sites

Thanks for the logs, The Malwarebytes log shows "No Action Taken by User" Please run Malwarebytes again and ensure to remove all listed entries...

Also run FRST one more time, ensure all boxes are checkmarked under "Whitelist" but only Addition.txt under "Optional scan" Select scan, when done post the new logs. "FRST.txt" and "Addition.txt"

Thank you,

Kevin

Edited by kevinf80
typing error
Link to post
Share on other sites

Sorry for the late reply, busy weekend. The hijacker seems to be back.
Anyway, i actually made a mistake when logging: I did quarantine everything, I made a log before that though.

A newly installed suspicious program called "deskapp" showed up. I uninstalled that before the FRST scan.

Anyway, here are the new logs.

Thank you for your help.

 

Addition.txt

FRST.txt

MBAM_log1.txt

Link to post
Share on other sites

  • 2 weeks later...
  • Root Admin

Due to the lack of feedback this topic is closed to prevent others from posting here. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.