Jump to content

Recommended Posts

  • Root Admin

Hello @Sequoia33

 

Please run the following steps and post back the logs as an attachment when ready.

STEP 01

  • If you're already running Malwarebytes 3 then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • If you don't have Malwarebytes 3 installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and check for updates. Then click on the Scan tab and select Threat Scan and click on Start Scan button.
  • Once the scan is completed click on the Export Summary button and save the file as a Text file to your desktop or other location you can find, and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know on your next reply.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Right-click on the program and select RunAsAdmin.jpg Run as Administrator to start the tool.
  • Accept the Terms of use.
  • Wait until the database is updated.
  • Click Scan.
  • When finished, please click Clean.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Copy its content into your next reply.

 

RESTART the computer before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here.
  • Please attach the Additions.txt log to your reply as well.

 

Thanks

Ron

 

Link to post
Share on other sites

Hi Ron,

Here is the MB Threat Scan log:

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 9/28/17
Scan Time: 7:31 PM
Log File: 
Administrator: Yes

-Software Information-
Version: 3.1.2.1733
Components Version: 1.0.160
Update Package Version: 1.0.2910
License: Premium

-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: workhorse-PC\work horse

-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 302442
Threats Detected: 0
(No malicious items detected)
Threats Quarantined: 0
(No malicious items detected)
Time Elapsed: 7 min, 5 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 0
(No malicious items detected)

Registry Value: 0
(No malicious items detected)

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 0
(No malicious items detected)

File: 0
(No malicious items detected)

Physical Sector: 0
(No malicious items detected)


(end)

Link to post
Share on other sites

  • Root Admin

I'm going to be on the road for a bit but please post the other logs and I'll take a look later tonight.

Let' me have you reset your browsers too.

 

Please visit each of the following sites and let's reset all of your browsers back to defaults to prevent unexpected issues.
If you are not using one of the browsers but it is installed then you may want to consider uninstalling it as older versions of some software can pose an increase in the potential for an infection to get in.

Internet Explorer
How to reset Internet Explorer settings

Microsoft Edge
How to Reset Microsoft Edge in Windows 10

Firefox
Click on Help / Troubleshooting Information then click on the Refresh Firefox button.

Chrome
Reset Chrome back to defaults to completely clear out issues with Chrome.

  • First, go to >> Google Sync << and sign into your account. Make sure you know your password as this will clear it from the browser.
  • Scroll down until you see the  reset_chrome_sync.png "reset sync" button to clear your data from the server and remove your passphrase.
  • Now, close all Chrome windows. Chrome cannot be running for the next step. If needed, print this information or use another browser to read the information.
  • Press the Windows key + R at the same time, to bring up the run dialog box.
    • run_command.png
  • Type in (or copy/paste) the following and press Enter:     %localappdata%\Google\Chrome\User Data\Default\
  1. Press Ctrl + A to select all the files and folders.
  2. Hold down Ctrl + A and click once on the files "Bookmarks" and "Bookmarks.bak". This will unselect them.
  3. With all the files selected (except for your Bookmarks), press the Delete key and click Yes to delete the files and folders.
  4. Example of all files and folders selected, except Bookmarks

chrome_files_folders.png

 

Restart your computer now and make sure there are no longer any redirects or other browser issues. 

 

Link to post
Share on other sites

Hi Ron,

Here is the ADWCleaner log:

# AdwCleaner 7.0.2.1 - Logfile created on Thu Sep 28 23:23:09 2017
# Updated on 2017/29/08 by Malwarebytes 
# Database: 08-29-2017.2
# Running on Windows 7 Professional (X64)
# Mode: scan
# Support: https://www.malwarebytes.com/support

***** [ Services ] *****

No malicious services found.

***** [ Folders ] *****

PUP.Optional.AdvancedSystemCare, C:\Windows\System32\config\systemprofile\AppData\Roaming\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare, C:\Program Files (x86)\Common Files\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare, C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare, C:\Users\work horse\AppData\LocalLow\IObit\Advanced SystemCare
PUP.Optional.AdvancedSystemCare, C:\Users\work horse\AppData\Roaming\IObit\Advanced SystemCare


***** [ Files ] *****

No malicious files found.

***** [ DLL ] *****

No malicious DLLs found.

***** [ WMI ] *****

No malicious WMI found.

***** [ Shortcuts ] *****

No malicious shortcuts found.

***** [ Tasks ] *****

No malicious tasks found.

***** [ Registry ] *****

PUP.Optional.AdvancedSystemCare, [Key] - HKLM\SOFTWARE\IOBIT\ASC
PUP.Optional.AdvancedSystemCare, [Key] - HKLM\SOFTWARE\CLASSES\DIRECTORY\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
PUP.Optional.AdvancedSystemCare, [Key] - HKLM\SOFTWARE\CLASSES\DRIVE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
PUP.Optional.AdvancedSystemCare, [Key] - HKLM\SOFTWARE\CLASSES\LNKFILE\SHELLEX\CONTEXTMENUHANDLERS\Advanced SystemCare
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{6C97A91E-4524-4019-86AF-2AA2D567BF5C}
PUP.Optional.Legacy, [Key] - HKLM\SOFTWARE\Microsoft\Internet Explorer\ActiveX Compatibility\{9522B3FB-7A2B-4646-8AF6-36E7F593073C}
PUP.Optional.Ask, [Key] - HKLM\SOFTWARE\AskToolbar
PUP.Optional.YahooChrome, [Key] - HKLM\SOFTWARE\Yahoo\SS


***** [ Firefox (and derivatives) ] *****

No malicious Firefox entries.

***** [ Chromium (and derivatives) ] *****

No malicious Chromium entries.

*************************

########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt ##########

Link to post
Share on other sites

  • Root Admin

Hi there. No, I want NEW logs after the Malwarebytes scan and the AdwCleaner scan. I also need the Clean log from AdwCleaner not the Scan log please.

As posted above I needed a restart, then new logs please.

RESTART the computer before running Step 3

 

Cheers

 

Link to post
Share on other sites

Hi Ron,

That was the scariest thing that has happened to my machine since a BSOD in the nineties. Started out with no Chrome, just IE. Imported bookmarks but only received 3 from IE, which I only use to access one site. Another attempt resulted in my 250 bookmarks being imported, along with Chrome. Many have new icons or are missing icons, but that will be corrected later.

If everything looks OK to you so far, am willing to stop here. After MB removed the trojan, I neglected to inspect my settings right away, so when I thought that I was re-infected I may have just been recognizing some of the trojan's prior changes to my settings. What do you think?

Link to post
Share on other sites

Hi Ron,

My machine seemed to be working fine this past week, except for one odd behavior: when I first sign on and click on Google, there is about a 7-second delay, as if I am being redirected. So I ran Rogue Killer, and it discovered the ANGLER exploit kit, and also Tr.ROSENA. (Notice that the log states "error" by the Tr.Rosena file.)

Here is the clean log:

Registry

Detection Name Path Key/Value Data Status
Suspicious.Path CLSID (X64) HKEY_CLASSES_ROOT\CLSID {F6BF8414-962C-40FE-90F1-B80A7E72DB9A} C:\ProgramData\{9A88E103-A20A-4EA5-8636-C73B709A5BF8}\wkscli.dll ERROR [4001]
PUM.HomePage IE Settings (X64) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Internet Explorer\Main Start Page http://www.cnn.com/ Replaced (http://go.microsoft.com/fwlink/p/?LinkId=255141)
PUM.HomePage IE Settings (X86) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Internet Explorer\Main Start Page http://www.cnn.com/ Replaced (http://go.microsoft.com/fwlink/p/?LinkId=255141)
PUM.Policies Policies (X64) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System ConsentPromptBehaviorAdmin 0 Replaced (2)
PUM.Policies Policies (X86) HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System ConsentPromptBehaviorAdmin 0 Replaced (2)
PUM.StartMenu Explorer Advanced (X64) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowControlPanel 2 Replaced (1)
PUM.StartMenu Explorer Advanced (X64) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowMyDocs 2 Replaced (1)
PUM.StartMenu Explorer Advanced (X64) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowDownloads 0 Replaced (1)
PUM.StartMenu Explorer Advanced (X64) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowRecentDocs 2 Replaced (1)
PUM.StartMenu Explorer Advanced (X64) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowVideos 0 Replaced (1)
PUM.StartMenu Explorer Advanced (X86) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowControlPanel 2 Replaced (1)
PUM.StartMenu Explorer Advanced (X86) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowMyDocs 2 Replaced (1)
PUM.StartMenu Explorer Advanced (X86) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowDownloads 0 Replaced (1)
PUM.StartMenu Explorer Advanced (X86) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowRecentDocs 2 Replaced (1)
PUM.StartMenu Explorer Advanced (X86) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Start_ShowVideos 0 Replaced (1)
Tr.Rosena Rosena (X64) HKEY_USERS\S-1-5-21-2561101334-532984164-2244958137-1000\Software\classes\clsid\{F6BF8414-962C-40FE-90F1-B80A7E72DB9A}     ERROR [2]
©2010-2015 Adlice Software

 

 

Link to post
Share on other sites

  • Root Admin

Hello @Sequoia33

My wife was in the hospital for emergency surgery so I've been away for over a week and just now getting back and have many topics to catch up on.

These are Potentially Unwanted Modifications, not infections per se.  The Tr.Rosena error 2 means the file was not found and it just had an entry for the file.

These are typically just left over changes or entries from cleaning the main infection. At the time the main infection was removed all the registry keys or files may not have bee known.

You can read the following to help understand a bit more about it.

The complexity of finding, preventing, and cleanup from malware
 

Overall you should be good to go now, but if you think you're still having issues please let me know.

Thanks

Ron

 

 

Link to post
Share on other sites

  • Root Admin

Glad we could help. :)If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this thread with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks!

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.