Jump to content

Recommended Posts

Hi,
 

Recently I've been having some computer problems and I suspect I've managed to get Malware or some kind of PUP/phishing software.
Any time I search something in chrome, the same thing pops up a few minutes later in a bing search that looks very suspect.


At the same time, my FB has started making unusual posts not made by myself, after logging out all accounts I found someone was logged in based in Taiwan.
Since then I've begun changing all my passwords but I'm worried that something is potentially tracking my actions in the background.


I've tried deleting anything unusual or newly downloaded over the past week but nothing seems to stop the problem.
I've ran malwarebytes and adwcleaner and removed anything highlighted. I've tried reinstalling my browser and also removed all extensions but this hasn't solved the problem.
Could something be running that can't be detected by malwarebytes?

 

A similar post was made here last year https://forums.malwarebytes.com/topic/258080-pup-became-undetectable-by-adwcleaner-and-keeps-operating/
A user Maurice Naggar, very kindly sorted the problem for the OP. 

I've since installed the malwarebytes extension and everytime the popups come back it warns me of detected PUPs in the bing page, but there is nothing new to detect.

Does anyone have any advice for what to try next?

Thanks,

Jake

 

 

Link to post
Share on other sites

  • Root Admin

Hello @jake0400

Please post back the log showing the detection.

 

You can find Scan and Protection logs within the Malwarebytes 4 program in the following location

 

image.png

 

RTP stands for Real-Time Protection and is where automatic protection operations would normally be logged

 

image.png

 

If you click on the View option you should get something similar to the following with other options available.

 

image.png

 

 

 

Thanks

 

Link to post
Share on other sites

  • Root Admin

Thank you. Please go ahead and run the following 3 steps

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 

 

Spoiler

 

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

  • Root Admin

Thank you for the logs @jake0400

Please temporarily disable your Avast antivirus and run the following fix.

 

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.
NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

Please make sure you disable any real time antivirus or security software before running this script. Once completed make sure you re-enable it.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1:  This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed. The use of an external password manager is highly recommended instead of using your browser to store passwords.

The following directories are emptied:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Flash Player cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.

fixlist.txt

Thanks

 

Link to post
Share on other sites

So done a little more looking and found a suspicious extension in chrome that I've already tried deleting twice. It's called uSecureSkip.
When I follow the extension source, I find a hidden folder called focx, I have no memory of this prior to the problems I'm having and it keeps reinstalling itself when deleted.


The extension was not present before the problems I'm having, I regularly check my extensions as I have some for language learning.
Deleting the folder and reinstalling chrome doesn't seem to kill it.

I've attached some screenshots of what I'm finding,

Any further help appreciated.

Thanks,

Jake

Usecureskip2.png

Usecureskip1.png

focx.png

Link to post
Share on other sites

  • Root Admin

Hello @jake0400 please provide the requested information that @TwinHeadedEagle asked for. That may help us to review and if found bad, possibly add automated rules to remove it for future users.

We do have a very extensive topic on how to clean up Google Chrome. For now though please don't clean up Chrome until we can look and see what is found in your Focx attachment.

 

For reference, please don't clean yet.

Thanks

 

Link to post
Share on other sites

  • Root Admin

It is just some script files, nothing too special. We'll go ahead and remove it before we're done here.

After you clean up Google Chrome let me have you run FRST again and click on SCAN and post back both the new logs.

It's after midnight for me so I'm heading out but will check back on you again in the morning.

Thanks @jake0400

 

 

Link to post
Share on other sites

Hi, I have managed to remove the extension and stop the files/folders from reoccurring when I restart my computer.
I saw a microsoft forum post where users were experiencing the same problem as myself, as recently as this week.
See here https://answers.microsoft.com/en-us/protect/forum/protect_defender-protect_scanning-windows_10/uaskembed-chrome-extension-virus/59297d4e-70fc-4b0d-9fe1-d3e5376ddb79?messageId=6d115e99-2df8-4545-a44a-a823f01bf186
I am user jake0400 and user AW gave a working solution.

To remove it and stop it returning, 
There was a Task Scheduler entry: \Microsoft\Windows\BrokerInfrastructure\AddresMmRes

I deleted this.

Then I deleted the following.

C:\ProgramData\ScriptsReal\TretWord\xmsds_Jonavider.dll

C:\ProgramData\Focx


The Focx folder deletes with no problems.

In my case, the folder and files TretWord\xmsds_Jonavider.dll 
were unviewable even with show hidden folders and I had no
admin privileges or ownership of them.
After changing ownership back to myself I wiped the whole
C:\ProgramData\ScriptsReal folder and this killed it.

Unfortunately, I didn't think to zip the other folder and send it here,
It was late for myself and I was happy to be rid of the problem.

Apologies for attempting something not instructed by you, I have massively appreciated your help.

If it's ok with you, I will clean my google chrome and post the FRST log here.

Thanks,

Jake

 

Link to post
Share on other sites

Hi,

I'm posting the results of the FRST scan after running the chrome cleanup instructions.

Also I'm attaching the results of the malwarebytes scan I did after cleaning up chrome.
It appeared to pick up some kind of PUP.


My computer appears to be running as normal on the surface now. Still concerned other malicious stuff could be going on.

Thanks,

Jake

mwbscanhist.png

Addition.txt FRST.txt mwb2.txt mwb1.txt mwb3.txt

Link to post
Share on other sites

  • Root Admin

The log still show that Google Chrome was not cleaned up well enough.

File: 3
PUP.Optional.Iminent, C:\USERS\JAKE\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, 83, 455248, 1.0.40250, , ame, , ADEC62D04C3B6F15D63190B00422789D, 45201C0EDBD035025F1AD07F42C383869B2E20CC7E3F1E17BC38FE57F2A11904
PUP.Optional.Iminent, C:\USERS\JAKE\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, 83, 455248, 1.0.40250, , ame, , ADEC62D04C3B6F15D63190B00422789D, 45201C0EDBD035025F1AD07F42C383869B2E20CC7E3F1E17BC38FE57F2A11904
PUP.Optional.Iminent, C:\USERS\JAKE\APPDATA\LOCAL\GOOGLE\CHROME\USER DATA\Default\Web Data, Replaced, 83, 455248, 1.0.40250, , ame, , ADEC62D04C3B6F15D63190B00422789D, 45201C0EDBD035025F1AD07F42C383869B2E20CC7E3F1E17BC38FE57F2A11904

 

Let me have you temporarily uninstall the following. Please go to Control Panel, Programs, Programs and Features

  • Avast Free Antivirus
  • Avast Secure Browser

Then restart the computer and run the following fix

 

 

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.
NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

Please make sure you disable any real time antivirus or security software before running this script. Once completed make sure you re-enable it.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1:  This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed. The use of an external password manager is highly recommended instead of using your browser to store passwords.

The following directories are emptied:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Flash Player cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.

fixlist.txt

Thanks

 

Link to post
Share on other sites

Hi,

Sorry if I didn't explain that well, I ran malwarebytes which returned those PUP alerts. I then quarantined and deleted them. The paths shown in the log have now been removed.
I've uninstalled all avast related stuff and ran FRST with the fixlist saved. Attached are the results.

Thanks,

Jake

Fixlog.txt

Link to post
Share on other sites

  • Root Admin

Great, thank you for the log and the update.

Please click on Start menu and type in "Check for updates" and allow Windows to check for updates and install them.

Once all the updates have completed please let me know. You can run WINVER.EXE to see the final updated version

 

Link to post
Share on other sites

  • Root Admin

Interesting. Is this computer in a business or was it in or from a business before?

The 2004 version is still supported but is an old build that will end support on Dec 14, 2021 from Microsoft.

The latest version of Windows 10 is: 20H2 build 19042 with the 21H1 version coming soon.

 

image.png

Link to post
Share on other sites

  • Root Admin

SecurityCheck by glax24              

I would like you to run a tool named SecurityCheck to inquire about the current-security-update status of some applications.

  • Download SecurityCheck by glax24 from here  https://tools.safezone.cc/glax24/SecurityCheck/SecurityCheck.exe
  • and save the tool on the desktop.
  • If Windows's  SmartScreen block that with a message-window, then
  • Click on the MORE INFO spot and over-ride that and allow it to proceed.
  • This tool is safe.   Smartscreen is overly sensitive.
  • Right-click  with your mouse on the Securitycheck.exe  and select "Run as administrator"   and reply YES to allow to run & go forward
  • Wait for the scan to finish. It will open in a text file named SecurityType.txt. Close the file.  Attach it with your next reply.
  • You can find this file in a folder called SecurityCheck, C:\SecurityCheck\SecurityCheck.txt

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.