celmo Posted November 29, 2017 ID:1187574 Share Posted November 29, 2017 I am running Win 10 Home 64 bit and keep getting notified of a blocking of going to the n65adserv.com site. Can you assist? I tried running in Safemode but Malwarebyte reported that the service could not be started in Safe Mode. Link to post Share on other sites More sharing options...
kevinf80 Posted November 29, 2017 ID:1187578 Share Posted November 29, 2017 Hello celmo and welcome to Malwarebytes, Follow the instructions at this link and post the requested logs: https://forums.malwarebytes.com/topic/9573-im-infected-what-do-i-do-now/ Thank you, Kevin Link to post Share on other sites More sharing options...
celmo Posted November 30, 2017 Author ID:1187707 Share Posted November 30, 2017 When I attempt to begin this process, I see the MB icon in the trey but when I attempt to open it, nothing happens. I will remove and reinstall and try again. Link to post Share on other sites More sharing options...
celmo Posted November 30, 2017 Author ID:1187708 Share Posted November 30, 2017 When I attempt to begin this process, I see the MB icon in the trey but when I attempt to open it, nothing happens. I will remove and reinstall and try again. Did so but had the same results. It appears all the options are ON, but I cannot access the settings. Link to post Share on other sites More sharing options...
kevinf80 Posted November 30, 2017 ID:1187710 Share Posted November 30, 2017 Can you run FRST and post the two produced logs...? Link to post Share on other sites More sharing options...
celmo Posted November 30, 2017 Author ID:1187748 Share Posted November 30, 2017 My browser crashes when I click on that tab to download FRST. I had to run in Safe Mode. Addition.txt FRST.txt Link to post Share on other sites More sharing options...
kevinf80 Posted November 30, 2017 ID:1187773 Share Posted November 30, 2017 Run the following in Safe mode with NW: Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix" NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work. Open FRST and press the Fix button just once and wait. The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply. Next, Open Malwarebytes Anti-Malware. On the Settings tab > Protection Scroll to and make sure the following are selected:Scan for RootkitsScan within Archives Scroll further to Potential Threat Protection make sure the following are set as follows:Potentially Unwanted Programs (PUP`s) set as :- Always detect PUP`s (recommended)Potentially Unwanted Modifications (PUM`s) set as :- Alwaysdetect PUM`s (recommended) Click on the Scan make sure Threat Scan is selected, A Threat Scan will begin. When the scan is complete if anything is found make sure that the first checkbox at the top is checked (that will automatically check all detected items), then click on the Quarantine Selected Tab If asked to restart your computer to complete the removal, please do so When complete click on Export Summary after deletion (bottom-left corner) and select Copy to Clipboard. Wait for the prompt to restart the computer to appear, then click on Yes. After the restart once you are back at your desktop, open MBAM once more to retrieve the log. To get the log from Malwarebytes do the following: Click on the Reports tab > from main interface. Double click on the Scan log which shows the Date and time of the scan just performed. Click Export > From export you have two options:Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your replyText file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply Use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply… Next, Download AdwCleaner by Malwarebytes onto your Desktop. Or from this Mirror Right-click on AdwCleaner.exe and select Run as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users) Accept the EULA (I accept), then click on Scan Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Clean button. This will kill all the active processes Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply Next, Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop Ensure to get the correct version for your system....https://www.microsoft.com/en-gb/download/malicious-software-removal-tool-details.aspx Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window In the "Scan Type" window, select Quick Scan Perform a scan and Click Finish when the scan is done. Retrieve the MSRT log as follows, and post it in your next reply: 1) Select the Windows key and R key together to open the "Run" function 2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:notepad c:\windows\debug\mrt.log Let me see those logs in your reply, also tell me there are any remaining issues or concerns... Thank you, Kevin... fixlist.txt Link to post Share on other sites More sharing options...
celmo Posted December 1, 2017 Author ID:1188022 Share Posted December 1, 2017 I was able to complete the scan. Here are the results. Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 11/30/17 Scan Time: 4:58 PM Log File: ff50be4c-d621-11e7-9423-782bcb9b1e20.json Administrator: Yes -Software Information- Version: 3.3.1.2183 Components Version: 1.0.236 Update Package Version: 1.0.3384 License: Trial -System Information- OS: Windows 10 (Build 17046.1000) CPU: x64 File System: NTFS User: W10-XPS\chris -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 380464 Threats Detected: 17 Threats Quarantined: 17 Time Elapsed: 15 min, 2 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 1 Rootkit.Fileless.MTGen, HKU\S-1-5-21-487436262-1151004194-535688579-1002_Classes\qrytrili\SHELL\OPEN\COMMAND, Quarantined, [1384], [261826],1.0.3384 Registry Value: 1 Rootkit.Fileless.MTGen, HKU\S-1-5-21-487436262-1151004194-535688579-1002_Classes\qrytrili\SHELL\OPEN\COMMAND|, Quarantined, [1384], [261826],1.0.3384 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 15 PUP.Optional.AdvancedSystemCare, C:\USERS\CHRIS\DOWNLOADS\ADVANCED-SYSTEMCARE-SETUP.EXE, Quarantined, [1219], [396386],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.DefaultSearch.ShrtCln, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [9091], [455072],1.0.3384 PUP.Optional.DefaultSearch.ShrtCln, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [9091], [455072],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.ASK, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [528], [454827],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [580], [454832],1.0.3384 Physical Sector: 0 (No malicious items detected) (end) Scan report from yesterday: Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 11/30/17 Scan Time: 4:58 PM Log File: ff50be4c-d621-11e7-9423-782bcb9b1e20.json Administrator: Yes -Software Information- Version: 3.3.1.2183 Components Version: 1.0.236 Update Package Version: 1.0.3384 License: Trial -System Information- OS: Windows 10 (Build 17046.1000) CPU: x64 File System: NTFS User: W10-XPS\chris -Scan Summary- Scan Type: Threat Scan Result: Completed Objects Scanned: 380464 Threats Detected: 17 Threats Quarantined: 17 Time Elapsed: 15 min, 2 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 0 (No malicious items detected) Module: 0 (No malicious items detected) Registry Key: 1 Rootkit.Fileless.MTGen, HKU\S-1-5-21-487436262-1151004194-535688579-1002_Classes\qrytrili\SHELL\OPEN\COMMAND, Quarantined, [1384], [261826],1.0.3384 Registry Value: 1 Rootkit.Fileless.MTGen, HKU\S-1-5-21-487436262-1151004194-535688579-1002_Classes\qrytrili\SHELL\OPEN\COMMAND|, Quarantined, [1384], [261826],1.0.3384 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 0 (No malicious items detected) File: 15 PUP.Optional.AdvancedSystemCare, C:\USERS\CHRIS\DOWNLOADS\ADVANCED-SYSTEMCARE-SETUP.EXE, Quarantined, [1219], [396386],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.DefaultSearch.ShrtCln, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [9091], [455072],1.0.3384 PUP.Optional.DefaultSearch.ShrtCln, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [9091], [455072],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.ASK, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [528], [454827],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [580], [454832],1.0.3384 PUP.Optional.Conduit, C:\USERS\CHRIS\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, [580], [454832],1.0.3384 Physical Sector: 0 (No malicious items detected) (end) restarting system. AdwCleaner[S0].txt Link to post Share on other sites More sharing options...
kevinf80 Posted December 1, 2017 ID:1188023 Share Posted December 1, 2017 You posted the scan results from AdwCleaner, did you use the Clean option to remove found entries..? Have you ran the Quick scan with Microsoft's " Malicious Software Removal Tool" can I see that log, also need an update on any remaining issues or concerns... Link to post Share on other sites More sharing options...
kevinf80 Posted December 1, 2017 ID:1188024 Share Posted December 1, 2017 You posted the scan results from AdwCleaner, did you use the Clean option to remove found entries..? Have you ran the Quick scan with Microsoft's " Malicious Software Removal Tool" can I see that log, also need an update on any remaining issues or concerns... Link to post Share on other sites More sharing options...
celmo Posted December 1, 2017 Author ID:1188026 Share Posted December 1, 2017 Had to submit what I had pasted so I could restart. Attached the log visible after restart. From the MS tool: (no threats detected) I haven't seen any pop up warning from MB since yesterday evening. --------------------------------------------------------------------------------------- Microsoft Windows Malicious Software Removal Tool v5.54, November 2017 (build 5.54.14383.1) Started On Fri Dec 01 05:29:26 2017 Engine: 1.1.14306.0 Signatures: 1.257.0.0 Run Mode: Interactive Graphical Mode AdwCleaner[C0].txt Link to post Share on other sites More sharing options...
kevinf80 Posted December 1, 2017 ID:1188028 Share Posted December 1, 2017 Thanks for the update and logs, if no more issues or concerns continue to clean up: Download "Delfix by Xplode" and save it to your desktop. Or use the following if first link is down:"Delfix link mirror" If your security program alerts to Delfix either, accept the alert or turn your security off. Double Click to start the program. If you are using Vista or higher, please right-click and choose run as administrator Make Sure the following items are checked: Remove disinfection tools <----- this will remove tools we may have used. Purge System Restore <--- this will remove all previous and possibly exploited restore points, a new point relative to system status at present will be created. Reset system settings <--- this will reset any system settings back to default that were changed either by us during cleansing or malware/infection Now click on "Run" and wait patiently until the tool has completed. The tool will create a log when it has completed. We don't need you to post this. Any remnant files/logs from tools we have used can be deleted… Next, Read the following links to fully understand PC Security and Best Practices, you may find them useful....Answers to Common Security Questions and best PracticesDo I need a Registry Cleaner? Take care and surf safe Kevin... Link to post Share on other sites More sharing options...
celmo Posted December 1, 2017 Author ID:1188048 Share Posted December 1, 2017 Thank you for your help. I had to reboot into Safe mode to run the application. I notice that during that time, windows 10 help tab kept openning up over and over, even after I closed Chrome. Not sure what that is about. Otherwise, the cleanup seemed to work. Link to post Share on other sites More sharing options...
kevinf80 Posted December 1, 2017 ID:1188050 Share Posted December 1, 2017 Is safe mode not available..? try this link: https://support.microsoft.com/en-gb/help/12376/windows-10-start-your-pc-in-safe-mode Link to post Share on other sites More sharing options...
celmo Posted December 1, 2017 Author ID:1188053 Share Posted December 1, 2017 I had to run the app after booting to safe mode. Link to post Share on other sites More sharing options...
kevinf80 Posted December 1, 2017 ID:1188054 Share Posted December 1, 2017 Do you mean Delfix would only run from Safe mode..? Sometimes system security will alert to Delfix, if that happens either accept the alert to let it run or turn security off... Link to post Share on other sites More sharing options...
kevinf80 Posted December 10, 2017 ID:1190637 Share Posted December 10, 2017 Glad we could help. If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request. This applies only to the originator of this thread.Other members who need assistance please start your own topic in a new thread. Thanks Link to post Share on other sites More sharing options...
Recommended Posts