Jump to content

System32 installing Chromium and other viruses/malware Part 2


Recommended Posts

Every few hours or so System32 or like a black window with text on it pops up and tries to download Chromium. It fails but a few minutes after that Chromium and Internet Explorer gets installed as well as 23 other threats when I use a Malware bytes scan. It gets annoying and I wish it would stop. I'm afraid that is damaging my PC so can anyone help me to prevent this from happening over and over again? Its been happening for about a week now.

 

This is copy and pasted from my last topic it told me to download some stuff and give you some files and someone would help me.

FRST.txt Addition.txt

Link to post
Share on other sites

Hello CookieDestroyer and welcome to Malwarebytes,

Continue with the following:

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

user posted image

Next,

Open Malwarebytes, select > "settings" > "protection tab"

Scroll down to "Scan Options" ensure Scan for Rootkits and Scan within Archives are both on....

Go back to "DashBoard" select the Blue "Scan Now" tab......

When the scan completes quarantine any found entries...

To get the log from Malwarebytes do the following:
 
  • Click on the Report tab > from main interface.
  • Double click on the Scan log which shows the Date and time of the scan just performed.
  • Click Export > From export you have two options:
    Copy to Clipboard - if seleted right click to your reply and select "Paste" log will be pasted to your reply
    Text file (*.txt) - if selected you will have to name the file and save to a place of choice, recommend "Desktop" then attach to reply

     
  • Please use "Copy to Clipboard, then Right click to your reply > select "Paste" that will copy the log to your reply…


Next,

Download AdwCleaner by Malwarebytes onto your Desktop.

Or from this Mirror
 
  • Right-click on AdwCleaner.exe and select user posted imageRun as Administrator (for Windows Vista, 7, 8, 8.1 and 10 users)
  • Accept the EULA (I accept), then click on Scan
  • Let the scan complete. Once it's done, make sure that every item listed in the different tabs is checked and click on the Quarantine button. This will kill all the active processes
  • Once the cleaning process is complete, AdwCleaner will ask to restart your computer, do it
  • After the restart, a log will open when logging in. Please copy/paste the content of that log in your next reply


Next,

Download Microsoft's " Malicious Software Removal Tool" and save direct to the desktop

Ensure to get the correct version for your system....

https://www.microsoft.com/en-gb/download/malicious-software-removal-tool-details.aspx


Right click on the Tool, select “Run as Administrator” the tool will expand to the options Window
In the "Scan Type" window, select Quick Scan
Perform a scan and Click Finish when the scan is done.


Retrieve the MSRT log as follows, and post it in your next reply:

1) Select the Windows key and R key together to open the "Run" function
2) Type or Copy/Paste the following command to the "Run Line" and Press Enter:

notepad c:\windows\debug\mrt.log

The log will include log details for each time MSRT has run, we only need the most recent log by date and time....

Let me see those logs in your reply, also tell me if there are any remaining issues or concerns...

Thank you,

Kevin...

fixlist.txt

Link to post
Share on other sites

Malwarebytes
www.malwarebytes.com

-Log Details-
Scan Date: 4/13/20
Scan Time: 10:30 PM
Log File: de143cce-7df7-11ea-8f60-1c1b0d442a35.json

-Software Information-
Version: 4.1.0.56
Components Version: 1.0.867
Update Package Version: 1.0.22424
License: Free

-System Information-
OS: Windows 10 (Build 18362.720)
CPU: x64
File System: NTFS
User: DESKTOP-C9BUDT7\lucky

-Scan Summary-
Scan Type: Threat Scan
Scan Initiated By: Manual
Result: Completed
Objects Scanned: 284146
Threats Detected: 36
Threats Quarantined: 35
Time Elapsed: 14 min, 21 sec

-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Detect
PUM: Detect

-Scan Details-
Process: 0
(No malicious items detected)

Module: 0
(No malicious items detected)

Registry Key: 4
PUP.Optional.WinYahoo.TskLnk, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{92CF7A0F-C24F-AB8F-73CF-DB0FA34F088F}, Quarantined, 879, 542290, , , , 
PUP.Optional.SelectedSearch, HKLM\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\bhdinjalofclbacjijgifpahcnjapclb, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, HKLM\SOFTWARE\WOW6432NODE\GOOGLE\CHROME\EXTENSIONS\bhdinjalofclbacjijgifpahcnjapclb, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, HKU\S-1-5-21-1764496182-2107241855-3708774983-1001\SOFTWARE\GOOGLE\CHROME\EXTENSIONS\bhdinjalofclbacjijgifpahcnjapclb, Quarantined, 289, 757186, , , , 

Registry Value: 1
PUP.Optional.SelectedSearch, HKU\S-1-5-21-1764496182-2107241855-3708774983-1001\SOFTWARE\GOOGLE\CHROME\PREFERENCEMACS\Default\extensions.settings|bhdinjalofclbacjijgifpahcnjapclb, Quarantined, 289, 757186, , , , 

Registry Data: 0
(No malicious items detected)

Data Stream: 0
(No malicious items detected)

Folder: 3
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\USERS\LUCKY\APPDATA\LOCAL\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}, Quarantined, 879, 542290, 1.0.22424, , ame, 
PUP.Optional.SelectedSearch, C:\USERS\LUCKY\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Sync Data\LevelDB, Removal Failed, 289, 757186, , , , 

File: 28
PUP.Optional.WinYahoo.TskLnk, C:\USERS\LUCKY\APPDATA\ROAMING\Microsoft\Windows\Start Menu\Programs\HowToRemove.lnk, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\USERS\LUCKY\APPDATA\LOCAL\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HOWTOREMOVE\HOWTOREMOVE.HTML, Quarantined, 879, 542290, 1.0.22424, , ame, 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\chromium-min.jpg, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\control panel-min-min.JPG, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\down.png, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\ff menu.JPG, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\ff search engine-min.png, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\hp-min ff.png, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\hp-min ie.png, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\search engine.gif, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\setup pages.gif, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\sp-min.png, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\start-min.jpg, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\HowToRemove\up.png, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\retadelat, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\socecorot, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\uninst.exe, Quarantined, 879, 542290, , , , 
PUP.Optional.WinYahoo.TskLnk, C:\Users\lucky\AppData\Local\{73AB45F7-5703-294F-3A9B-0CA71EF3F03F}\uninstp.dat, Quarantined, 879, 542290, , , , 
PUP.Optional.SelectedSearch, C:\USERS\LUCKY\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000005.ldb, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000027.log, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000029.ldb, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOCK, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\Users\lucky\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\MANIFEST-000001, Quarantined, 289, 757186, , , , 
PUP.Optional.SelectedSearch, C:\USERS\LUCKY\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Secure Preferences, Replaced, 289, 757186, 1.0.22424, , ame, 

Physical Sector: 0
(No malicious items detected)

WMI: 0
(No malicious items detected)


(end)

 

 

 

Also for the adwCleaner no items were detected I have yet to do the microsoft scan thing

t346236df.txt Fixlog.txt

Link to post
Share on other sites

This is the mrt 

 


---------------------------------------------------------------------------------------
Microsoft Windows Malicious Software Removal Tool v5.81, (build 5.81.16832.1)
Started On Mon Apr 13 22:56:42 2020

Engine: 1.1.16800.2
Signatures: 1.311.96.0
MpGear: 1.1.16330.1
Run Mode: Interactive Graphical Mode

Results Summary:
----------------
No infection found.
Successfully Submitted Heartbeat Report
Microsoft Windows Malicious Software Removal Tool Finished On Mon Apr 13 22:59:42 2020


Return code: 0 (0x0)
 

Link to post
Share on other sites

Thanks for those logs CookieDestroyer, what is the current status of your system....

Run FRST one more time, ensure all boxes are checkmarked under "Whitelist" but only Addition.txt under "Optional scan" Select scan, when done post the new logs. "FRST.txt" and "Addition.txt"

user posted image
 
Thank you,
 
Kevin..

 

Link to post
Share on other sites

Hello CookieDestroyer,

Those logs indicate there is still infection on your system.. Continue please:

Download attached fixlist.txt file (end of reply) and save it to the Desktop, or the folder you saved FRST into. "Do not open that file when running FRST fix"
NOTE. It's important that both FRST and fixlist.txt are in the same location or the fix will not work.

Open FRST and press the Fix button just once and wait.
The tool will make a log on the Desktop (Fixlog.txt) or the folder it was ran from. Please post it to your reply.

user posted image

Next,

Go here and click 'SCAN NOW' under 'ESET Online Scanner' save to your Desktop.
 
  • You will be prompted to download and install esetonlinescanner_enu.exe. Click on the link and save the file to a convenient location.
  • Double-click on esetonlinescanner_enu.exe to install and a new window will open. Follow the prompts.
  • Turn off the real-time scanner of any existing antivirus program before performing the online scan. Here's how
  • At the bottom of the Terms of use window, tick the option Download latest version of ESET Online Scanner then click Accept
  • When/if prompted by UAC, 'Do you want to allow this app to make changes to your PC?', please choose Yes
  • Tick the option Enable detection of potentially unwanted applications
  • Click on Advanced settings
  • Make sure that the option Clean threats automatically is unticked.
  • Ensure these options are ticked:
 
  • Enable detection of potentially unsafe applications
  • Enable detection of suspicious applications
  • Scan archives
  • Enable Anti-Stealth technology
 
  • Click Scan
  • Wait for the scan to finish.
  • When the scan is done, if it shows a screen that says Threats found, click Save to text file... then name it and save it to your desktop.
  • Do NOT be alarmed by what you see in the report. Many of the finds have likely been quarantined.
  • Please copy/paste the contents of the log in your next reply.
  • To close ESET Online Scanner, select Do not clean then Finish



Let me see thhose logs in your reply...

Thank you,

Kevin.

fixlist.txt

Link to post
Share on other sites

Here is the fixlog

 

Btw I dont know what you mean by "scan now" I went to where you told me and it said "one time scan" so I clicked that after searching for "scan now"

I did the one time scan and couldn't see any of your instructions so I just did the one time scan normally and got 1 threat which it didn't show me what it was so sorry.

Fixlog.txt

Link to post
Share on other sites

Hello CookieDestroyer,

Yes your logs look good now, continue to clean up:

Right click on FRST here: C:\Users\lucky\Desktop\FRST64.exe and rename uninstall.exe when complete right click on uninstall.exe and select "Run as Administrator"

If you do not see the .exe appended that is because file extensions are hidden, in that case just rename FRST64 to uninstall

That action will remove FRST and all created files and folders...

Next,

Remove all System Restore Points: https://www.tenforums.com/tutorials/33593-delete-system-restore-points-windows-10-a.html#option2

Create clean fresh Restore Point: http://www.thewindowsclub.com/create-system-restore-point

Run Windows Disk Clean Up Utility - https://neosmart.net/wiki/disk-cleanup/

From there you should be good to go...

Next,

Read the following links to fully understand PC Security and Best Practices, you may find them useful....

Answers to Common Security Questions and best Practices

Do I need a Registry Cleaner?

Take care and surf safe

Kevin... user posted image
Link to post
Share on other sites

  • Root Admin

Glad we could help.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this thread. Other members who need assistance please start your own topic in a new thread.

Please review the following for Tips to help protect from infection

Thank you

 

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.