Jump to content

Appdata folders/files keep coming back and website blocked notices


Recommended Posts

Unfortunately, I've come across malware/adware/trojan (?) issues due to my own fault in recently downloading a file for a free installation of a program I was desperately needing on my computer.

I have run scans with Malwarebytes which cleared most of it so now they show that there are no threats detected. However, I am positive it is not all gone as I continue to get "website blocked" notices by Malwarebytes and I see that there are folders and files in my User folder that keep coming back which cannot be deleted (Appdata, Local, Microsoft, Packages, LocalState, etc.)... I ran Adwcleaner and I have attached the log file to this post. I downloaded FRST but I can't seem to open the installation so I somehow cannot get the log? I'm on Windows 10.

Any help would be greatly appreciated :( !

Tinya

 

AdwCleaner[C3].txt

Link to post
Share on other sites

Hi tinyteacup :)

My name is Aura and I'll be assisting you with your malware issue. Since we'll be working together, you can call me Aura or Yoan, which is my real name, it's up to you! Now that we've broke the ice, I'll just ask you a few things during the time we'll be working together to clean your system and get it back to an operational state.

  • As you'll notice, the logs we are asking for here are quite lenghty, so it's normal for me to not reply exactly after you post them. This is because I need some time to analyse them and then act accordingly. However, I'll always reply within 24 hours, 48 hours at most if something unexpected happens;
  • As long as I'm assisting you on Malwarebytes Forums, in this thread, I'll ask you to not seek assistance anywhere else for any issue related to the system we are working on. If you have an issue, question, etc. about your computer, please ask it in this thread and I'll assist you;
  • The same principle applies to any modifications you make to your system, I would like you to ask me before you do any manipulations that aren't in the instructions I posted. This is to ensure that we are operating in sync and I know exactly what's happening on your system;
  • If you aren't sure about an instruction I'm giving you, ask me about it. This is to ensure that the clean-up process goes without any issue. I'll answer you and even give you more precise instructions/explanations if you need. There's no shame in asking questions here, better be safe than sorry!;
  • If you don't reply to your thread within 3 days, I'll bump this thread to let you know that I'm waiting for you. If you don't reply after 5 days, it'll be closed. If you return after that period, you can send me a PM to get it unlocked and we'll continue where we left off;
  • Since malware can work quickly, we want to get rid of them as fast as we can, before they make unknown changes to the system. This being said, I would appreciate if you could reply to this thread within 24 hours of me posting. This way, we'll have a good clean-up rhythm and the chances of complications will be reduced;
  • I'm against any form of pirated, illegal and counterfeit software and material. So if you have any installed on your system, I'll ask you to uninstall them right now. You don't have to tell me if you indeed had some or not, I'll give you the benefit of the doubt. Plus, this would be against Malwarebytes Forums's rules;
  • In the end, you are the one asking for assistance here. So if you wish to go a different way during the clean-up, like format and reinstall Windows, you are free to do so. I would appreciate you to let me know about it first, and if you need, I can also assist you in the process;
  • I would appreciate if you were to stay with me until the end, which means, until I declare your system clean. Just because your system isn't behaving weirdly anymore, or is running better than before, it doesn't mean that the infection is completely gone;
    This being said, I have a full time job so sometimes it'll take longer for me to reply to you. Don't worry, you'll be my first priority as soon as I get home and have time to look at your thread;


This being said, it's time to clean-up some malware, so let's get started, shall we? :)

Are you able to provide me a few reports where I can see the "Website blocked" notification? It'll help me locate the issue on your system.

https://www.malwarebytes.com/support/guides/mbam/Reports.html

Link to post
Share on other sites

Alright. From the research I did, the culprit might be a Google Chrome extension you have installed. These are the ones I can see in your logs:
 

CHR Extension: (Google Slides) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek [2017-06-08]
CHR Extension: (Google Docs) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\aohghmighlieiainnegkcijnfilokake [2017-06-08]
CHR Extension: (Google Drive) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\apdfllckaahabafndbhieahigkjlhalf [2017-06-08]
CHR Extension: (YouTube) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\blpcfgokakmgnkcojhhkbfbldkacnbeo [2017-06-08]
CHR Extension: (Honey) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmnlcjabgnpnenekpadlanbbkooimhnj [2017-06-08]
CHR Extension: (Mendeley Importer) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\dagcmkpagjlhakfdhnbomgmjdpkdklff [2017-06-08]
CHR Extension: (Adobe Acrobat) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\efaidnbmnnnibpcajpcglclefindmkaj [2017-06-08]
CHR Extension: (Google Sheets) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\felcaaldnbdncclmgdcncolpebgiejap [2017-06-08]
CHR Extension: (Google Docs Offline) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi [2017-06-08]
CHR Extension: (AdBlock) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\gighmmpiobklfepjocnamgkkbiglidom [2017-06-08]
CHR Extension: (Pinterest Save Button) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\gpdjojdkbbmdfjfahjcgigfpmkopogic [2017-06-08]
CHR Extension: (The Elementals) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\hfhfehlnocjpbnbcabcjjnemkkkghaak [2017-06-08]
CHR Extension: (Rapportive) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\hihakjfhbmlmjdnnhegiciffjplmdhin [2017-06-08]
CHR Extension: (Pixlr Express) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\hojmjpdlmjopaeginhldhiokeidchjid [2017-06-08]
CHR Extension: (Auto Replay for YouTube™) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\kanbnempkjnhadplbfgdaagijdbdbjeb [2017-06-08]
CHR Extension: (Grammarly for Chrome) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\kbfnbcaeplbcioakkpcpgfkobkghlhen [2017-06-08]
CHR Extension: (Google Hangouts) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\knipolnnllmklapflnccelgolnpehhpl [2017-06-08]
CHR Extension: (Little Alchemy) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\knkapnclbofjjgicpkfoagdjohlfjhpd [2017-06-08]
CHR Extension: (Morpheon Dark) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\mafbdhjdkjnoafhfelkjpchpaepjknad [2017-06-08]
CHR Extension: (Boomerang for Gmail) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\mdanidgdpmkimeiiojknlnekblgmpdll [2017-06-08]
CHR Extension: (Merge PDF - Split PDF - Sejda.com) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\nhcknfplofcnpdjalbhnjognbpncojbi [2017-06-08]
CHR Extension: (Chrome Web Store Payments) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2017-06-08]
CHR Extension: (Sinuous) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\omlmnomieeknagejjojcpdomnbnbchdl [2017-06-08]
CHR Extension: (Unblock Youku) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\pdnfnkhpgegpcingjbfihlkjeighnddk [2017-06-08]
CHR Extension: (Gmail) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\pjkljhegncpnkpknbcohdijeoejaedia [2017-06-08]
CHR Extension: (Chrome Media Router) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2017-06-08]
CHR Extension: (RSS Feed Reader) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\pnjaodmkngahhkoihejjehlcdlnohgmp [2017-06-08]
CHR Extension: (Streak CRM for Gmail) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\pnnfemgpilpdaojpnkjdgfgbnnjojfik [2017-06-08]

Is there any that you don't recognise? 

Link to post
Share on other sites

Alright, go in your Extensions and uninstall them all (Chrome Media Router, Pixlr Express, Little Alchemy, Elementals and Sinuous). Once done, please run FRST again and provide me the FRST.txt (attach it) so I can check whether or not the extensions are really gone.

Also, are you signed in Google Chrome with your Google account? If so, are you logged in your Google account on Chrome on any other additional devices (computer, laptop, phone, etc.)?

Link to post
Share on other sites

Nope, we'll remove them using a FRST fix.

iO3R662.pngFarbar Recovery Scan Tool (FRST) - Fix mode
Follow the instructions below to execute a fix on your system using FRST, and provide the log in your next reply.

  • Download the attached fixlist.txt file, and save it on your Desktop (or wherever your FRST.exe/FRST64.exe executable is located);
  • Right-click on the FRST executable and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Click on the Fix button;
    NYA5Cbr.png
  • On completion, a message will come up saying that the fix has been completed and it'll open a log in Notepad;
  • Copy and paste its content in your next reply;

Do you still get these block notifications after running the FRST fix?

fixlist.txt

Link to post
Share on other sites

Fix result of Farbar Recovery Scan Tool (x64) Version: 10-06-2017
Ran by Tinya (10-06-2017 14:17:09) Run:1
Running from C:\Users\Tinya\Downloads
Loaded Profiles: Tinya (Available Profiles: Tinya)
Boot Mode: Normal
==============================================

fixlist content:
*****************
CHR Extension: (Pixlr Express) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\hojmjpdlmjopaeginhldhiokeidchjid [2017-06-08]
CHR Extension: (Little Alchemy) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\knkapnclbofjjgicpkfoagdjohlfjhpd [2017-06-08]
CHR Extension: (Sinuous) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\omlmnomieeknagejjojcpdomnbnbchdl [2017-06-08]
CHR Extension: (Chrome Media Router) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2017-06-08]
CHR Extension: (The Elementals) - C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\hfhfehlnocjpbnbcabcjjnemkkkghaak [2017-06-08]

*****************

C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\hojmjpdlmjopaeginhldhiokeidchjid => moved successfully
C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\knkapnclbofjjgicpkfoagdjohlfjhpd => moved successfully
C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\omlmnomieeknagejjojcpdomnbnbchdl => moved successfully
C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm => moved successfully
C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\hfhfehlnocjpbnbcabcjjnemkkkghaak => moved successfully

==== End of Fixlog 14:17:10 ====

Link to post
Share on other sites

Okay nvm I just got like 10 notifications all coming in at the same time again. Here are example logs:

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 6/10/17
Protection Event Time: 2:25 PM
Log File: 
Administrator: Yes

-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.141
Update Package Version: 1.0.2129
License: Trial

-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, , Blocked, [-1], [-1],0.0.0

-Website Data-
Domain: soirqzccdtyk.com
IP Address: 216.21.13.15
Port: [65148]
Type: Outbound
File: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(end)

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 6/10/17
Protection Event Time: 2:25 PM
Log File: 
Administrator: Yes

-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.141
Update Package Version: 1.0.2129
License: Trial

-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, , Blocked, [-1], [-1],0.0.0

-Website Data-
Domain: jtumenosmrte.com
IP Address: 216.21.13.14
Port: [65165]
Type: Outbound
File: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(end)

Link to post
Share on other sites

What you saw in the block notifications were domain names, not Google Chrome extension IDs :) 

Also, these domain names allowed me to find a paste online of a .js script that contained these domains, proving that your infection is a known threat. We just need to identify which one is it and remove it.

For now, let's take it one step at the time. We'll leave it at that for now, and let me know if you receive another notification today or this weekend.

Let's try something. Uninstall Google Chrome on your computer and reinstall it, BUT, do NOT log in your Google account. Use Chrome without being logged in. Do you get the block notifications then?

Edited by Aura
Link to post
Share on other sites

I just tried with Microsoft Edge (the new IE) and yes, I still get them. It seems like instead of Chrome.exe, it can change for any browser type (MicrosoftEdge.exe) as you can see the log below:

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 6/11/17
Protection Event Time: 1:37 PM
Log File: 
Administrator: Yes

-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.141
Update Package Version: 1.0.2133
License: Trial

-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, , Blocked, [-1], [-1],0.0.0

-Website Data-
Domain: xbzmworkoyrx.com
IP Address: 216.21.13.15
Port: [57198]
Type: Outbound
File: C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe

(end)

 

Malwarebytes
www.malwarebytes.com

-Log Details-
Protection Event Date: 6/11/17
Protection Event Time: 1:35 PM
Log File: 
Administrator: Yes

-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.141
Update Package Version: 1.0.2133
License: Trial

-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: System

-Blocked Website Details-
Malicious Website: 1
, , Blocked, [-1], [-1],0.0.0

-Website Data-
Domain: jtumenosmrte.com
IP Address: 216.21.13.15
Port: [56852]
Type: Outbound
File: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe

(end)

Link to post
Share on other sites

Alright. Just to cover our bases, let's run a scan with JRT.

iT103hr.pngJunkware Removal Tool (JRT)

  • Download Junkware Removal Tool (JRT) and move it to your Desktop;
  • Right-click on JRT.exe and select Spcusrh.pngRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users);
  • Press on any key to launch the scan and let it complete;
    tLsXbWy.png
    Credits : BleepingComputer.com
  • Once the scan is complete, a log will open. Please copy/paste the content of the output log in your next reply;

Link to post
Share on other sites

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.3 (04.10.2017)
Operating System: Windows 10 Pro x64 
Ran by Tinya (Administrator) on 2017-06-11 at 23:47:14.17
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


File System: 2 

Successfully deleted: C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Extensions\bmnlcjabgnpnenekpadlanbbkooimhnj (Folder) 
Successfully deleted: C:\Users\Tinya\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bmnlcjabgnpnenekpadlanbbkooimhnj (Folder) 

Registry: 0 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 2017-06-11 at 23:50:01.12
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 

Link to post
Share on other sites

Alright let's try something.

Download Process Monitor from the Sysinternal Suite, and extract the ProcessMonitor.zip archive.

https://technet.microsoft.com/en-us/sysinternals/processmonitor.aspx

Once done, launch Procmon.exe with Admin Rights and wait for the program to start capturing (you'll see entries appears very fast). Now, launch Google Chrome (or any other web browser) so you get a few block notifications from Malwarebytes. Once done, click on the little magnifying lense button to stop the capture.

a3x3Juy.png

After that, click on "File", "Save..." and save the logfile (by default it'll be saved in the ProcessMonitor folder). Compress it (.zip), and attach it in your next post.

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.