Jump to content

Quarantined Files, Still Having Issue


Recommended Posts

So I have unfortunately fallen victim to the search.yahoo redirect virus. I've removed the browser extension and have run a scan which found 3 PUPS. I quarantined and then deleted them all. Unsynced my google account. Restarted my computer. Turned on the 'Scan for rootkits' option. Have rescanned at least 3 times and found nothing, but I'm still encountering the yahoo redirect every time I used my browser. I've attached the culprit file, but I can't delete it as every time I try I get a popup that I've also attached. What do I do now?

Screenshot 2022-11-11 182410.png

Screenshot 2022-11-11 182538.png

Link to post
Share on other sites

So I have unfortunately fallen victim to the search.yahoo redirect virus. I've removed the browser extension and have run a scan which found 3 PUPS. I quarantined and then deleted them all. Unsynced my google account. Restarted my computer. Turned on the 'Scan for rootkits' option. Have rescanned at least 3 times and found nothing, but I'm still encountering the yahoo redirect every time I used my browser. I've attached the culprit file, but I can't delete it as every time I try I get a popup that I've also attached. What do I do now?

BC6CDE7F-ABF0-46C3-AC15-04B493F3D326.png

62A03004-007E-447F-A5BF-E92BEFE728B4.png

Link to post
Share on other sites

Although you posted this in the Mac Malware Removal forum, it's obvious that you using a Windows computer.

I'll summon an admin to move this for you so that the correct users/staff reps can help you... @AdvancedSetup

Edited by alvarnell
Link to post
Share on other sites

  • Root Admin

Hello  and  :welcome:     @saffronelf

 

My screen name is AdvancedSetup and I will assist you with your system issues.
 

Let's keep these principles as we proceed. Make sure to read the entire post below first.

  • Please follow all steps in the provided order and post back all requested logs
  • Please attach all log files to your post, unless otherwise requested
  • Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans have been completed.
  • Temporarily disable Microsoft SmartScreen to download the software below if needed. Make sure to turn it back on once the scans are completed.
  • Searching, detecting, and removing malware isn't instantaneous and there is no guarantee to repair every system.
  • Before we start, please make sure that you have an external backup, not connected to this system, of all private data.
  • Do not run online games while the case is ongoing. Do not do any free-wheeling or risky web-surfing.
  • Only run the tools I guide you to use. Please don't run any other scans, download, install or uninstall any programs while I'm working with you.
  • Cracked, Hacked, or Pirated programs are not only illegal but also can make a computer a malware victim. Having such programs installed is the easiest way to get infected. It is the leading cause of ransomware encryption. It is at times also a big source of current Trojan infections. If there are any on the system you should uninstall them before we proceed.
  • Please be patient and stick with me until I give you the "all clear". We don't want to waste your time, please don't waste ours.
  • If your system is running Discord, please be sure to Exit it while this case is ongoing.

 

To begin, please do the following so that we may take a closer look at your installation for troubleshooting. This is a report only.

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to the Public desktop, please upload that file on your next reply

Thank you

 

 

Link to post
Share on other sites

10 hours ago, alvarnell said:

Although you posted this in the Mac Malware Removal forum, it's obvious that you using a Windows computer.

I'll summon an admin to move this for you so that the correct users/staff reps can help you... @AdvancedSetup

Thank you. I did make a new post in the correct thread, I just forgot to delete the original. Sorry about that.

Link to post
Share on other sites

  • Root Admin

Hello @saffronelf

This is not a virus. Just a simple trick of manipulating the browser. The removal of an MSI file has nothing to do with an infection. It is an issue that has plagued Windows for decades now as there is an expected file and registry structure expected and when it gets messed up then MSI cannot do a normal uninstall.

We can manually remove most of it though.

Please click on Start and type CMD.EXE and when it shows right-click it and select "Run as administrator" and then copy and paste the following and hit the Enter key

DIR C:\BESetup*.MSI /a /s 

 

If the file is still on your computer that command should tell user where it's located and find something like this:  BESetup_ExeWC.msi

 

Post back the results of that command.

Thanks

 

 

Edited by AdvancedSetup
Updated information
Link to post
Share on other sites

6 minutes ago, AdvancedSetup said:

Hello @saffronelf

This is not a virus. Just a simple trick of manipulating the browser. The removal of an MSI file has nothing to do with an infection. It is an issue that has plagued Windows for decades now as there is an expected file and registry structure expected and when it gets messed up then MSI cannot do a normal uninstall.

We can manually remove most of it though.

Please click on Start and type CMD.EXE and when it shows right-click it and select "Run as administrator" and then copy and paste the following and hit the Enter key

DIR C:\BESetup*.MSI /a /s 

 

If the file is still on your computer that command should tell user where it's located and find something like this:  BESetup_ExeWC.msi

 

Post back the results of that command.

Thanks

 

 

This is the result.

CMD.png

Link to post
Share on other sites

  • Root Admin

Okay, that's what I expected. It will need to be manually removed.

For now, please do the following. I'm leaving to go out of town so I'll check back with you later tonight when I get back.

 

 

Please follow the directions from the following topic and let us know if that corrects the issue for you.

 

Thank you

 

Link to post
Share on other sites

  • Root Admin

Let me have you run a different scanner to double-check.

I would suggest a free scan with the ESET Online Scanner

Go to https://download.eset.com/com/eset/tools/online_scanner/latest/esetonlinescanner.exe

  • It will start a download of "esetonlinescanner.exe"
  • Save the file to your system, such as the Downloads folder, or else to the Desktop.
  • Go to the saved file, and double click it to get it started. 
  • When presented with the initial ESET options, click on "Computer Scan".
  • Next, when prompted by Windows, allow it to start by clicking Yes 
  • When prompted for scan type, Click on Full scan 
  • Look at & tick  ( select )   the radio selection "Enable ESET to detect and quarantine potentially unwanted applications"   and click on the Start scan button.
  • Have patience.  The entire process may take an hour or more. There is an initial update download.
  • There is a progress window display.
  • You should ignore all prompts to get the ESET antivirus software program.   ( e.g. their standard program).   You do not need to buy or get or install anything else.
  • When the scan is completed, if something was found, it will show a screen with the number of detected items.  If so, click the button marked “View detected results”.
  • Click The blue “Save scan log” to save the log.
  • If something was removed and you know it is a false finding, you may click on the blue ”Restore cleaned files”  ( in blue, at the bottom).
  • Press Continue when all done.  You should click to off the offer for “periodic scanning”.

 

Note: If you do need to do a File Restore from ESET please follow the directions below

[KB2915] Restore files quarantined by the ESET Online Scanner version 3

https://support.eset.com/en/kb2915-restore-files-quarantined-by-the-eset-online-scanner

 

Link to post
Share on other sites

  • Root Admin

Okay, let me have you run the following please. We'll see what else we can try

 

Please run the following steps and post back the logs as an attachment when ready.
Temporarily disable your antivirus or other security software first. Make sure to turn it back on once the scans are completed.
Temporarily disable Microsoft SmartScreen to download software below if needed. Make sure to turn it back on once the scans are completed.
If you still have trouble downloading the software please click on Reveal Hidden Contents below for examples of how to allow the download.

 

Spoiler
 
 
 
 
Spoiler

When downloading with some browsers you may see a different style of screens that may block FRST from downloading. The program is safe and used hundreds of times a week by many users.

Example of Microsoft Edge blocking the download

image.png

image.png

image.png

 



STEP 01

  • If you already have Malwarebytes installed then open Malwarebytes and click on the Scan button. It will automatically check for updates and run a Threat Scan.
  • If you don't have Malwarebytes installed yet please download it from here and install it.
  • Once installed then open Malwarebytes and select Scan and let it run.
  • Once the scan is completed make sure you have it quarantine any detections it finds.
  • If no detections were found click on the Save results drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If there were detections then once the quarantine has completed click on the View report button, Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If the computer restarted to quarantine you can access the logs from the Detection History, then the History tab. Highlight the most recent scan and double-click to open it. Then click the Export drop-down, then the Export to TXT  button, and save the file as a Text file to your desktop or other location you can find and attach that log on your next reply.
  • If Malwarebytes won't run then please skip to the next step and let me know in your next reply that the scanner would not run.

STEP 02

Please download AdwCleaner by Malwarebytes and save the file to your Desktop.

  • Double-click to run the program
  • Accept the End User License Agreement.
  • Wait until the database is updated.
  • Click Scan Now.
  • When finished, if items are found please click Quarantine.
  • Your PC should reboot now if any items were found.
  • After reboot, a log file will be opened. Attach or Copy its content into your next reply.

RESTART THE COMPUTER Before running Step 3

STEP 03
Please download the Farbar Recovery Scan Tool and save it to your desktop.

Note: You need to run the version compatible with your system. You can check here if you're not sure if your computer is 32-bit or 64-bit

  • Double-click to run it. When the tool opens, click Yes to disclaimer.
  • Press the Scan button.
  • It will make a log (FRST.txt) in the same directory the tool is run. Please attach it to your reply.
  • The first time the tool is run, it also makes another log (Addition.txt). If you've, run the tool before you need to place a check mark here each time
  • Please attach the Additions.txt log to your reply as well.
  • On your next reply, you should be attaching frst.txt and additions.txt to your post, every time.

 

Thanks

Link to post
Share on other sites

  • Root Admin

Something did not run correctly for the Farbar scanner. The log was truncated. @saffronelf

Please restart the computer one more time. Then temporarily disable your security software and run Farbar again with Admin rights and click the SCAN button.

Then attach both new logs

FRST.TXT
ADDITION.TXT

 

Then also let me know how the computer is running now, and if there are still any signs of an infection or not.

 

Thank you

 

Link to post
Share on other sites

  • Root Admin

Please run the following items @saffronelf

[ 1 ]

Your DNS Servers: 75.75.75.75 - 75.75.76.76

Please consider changing your default DNS Server settings. Please choose one provider only

DNS is what lets users connect to websites using domain names instead of IP addresses

  • Google Public DNS: IPv4   8.8.8.8 and 8.8.4.4   IPv6   2001:4860:4860::8888 and 2001:4860:4860::8844
  • Cloudflare: IPv4   1.1.1.1 and 1.0.0.1   IPv6   2606:4700:4700::1111 and 2606:4700:4700::1001
  • OpenDNS: IPv4   208.67.222.222 and 208.67.220.220  IPv6  2620:119:35::35 and 2620:119:53::53
  • DNSWATCH: IPv4   84.200.69.80 and 84.200.70.40   IPv6  2001:1608:10:25::1c04:b12f and 2001:1608:10:25::9249:d69b

The Ultimate Guide to Changing Your DNS Server
https://www.howtogeek.com/167533/the-ultimate-guide-to-changing-your-dns-server/

Here is a YouTube video on Changing DNS settings if needed

 

[ 2 ]

CHR Notifications: Default -> hxxps://teams.microsoft.com; hxxps://www.netflix.com; hxxps://www.pinterest.com

Are you sure you want this enabled or allowed? Push Notifications on your browser appear to be enabled.

https://blog.malwarebytes.com/security-world/technology/2019/01/browser-push-notifications-feature-asking-abused/

Turn notifications on or off - Google Chrome

Web Push notifications in Firefox

 

[ 3 ]

Please temporarily disable Avast realtime antivirus and run the following fix

https://helpdeskgeek.com/how-to/how-to-turn-off-or-disable-avast-temporarily/

 

Please run the following fix once you've temporarily disabled Avast

Once the fix has been completed, please attach the file FIXLOG.TXT to your next reply

 

Please download the attached fixlist.txt file and save it to the Desktop or location where you ran FRST from.
NOTE. It's important that both files, FRST or FRST64, and fixlist.txt are in the same location or the fix will not work.

Please make sure you disable any real-time antivirus or security software before running this script. Once completed, make sure you re-enable it.

NOTICE: This script was written specifically for this user, for use on this particular machine. Running this on another machine may cause damage to your operating system that cannot be undone.

Run FRST or FRST64 and press the Fix button just once and wait.
If the tool needs a restart please make sure you let the system restart normally and let the tool complete its run after restart.
The tool will make a log on the Desktop (Fixlog.txt) or wherever you ran FRST from. Please attach or post it to your next reply.

Note: If the tool warned you about an outdated version please download and run the updated version.

NOTE-1:  This fix will run a scan to check that all Microsoft operating system files are valid and not corrupt and attempt to correct any invalid files. It will also run a disk check on the restart to ensure disk integrity. Depending on the speed of your computer this fix may take 30 minutes or more.

NOTE-2: As part of this fix all temporary files will be removed. If you have any open web pages that have not been bookmarked please make sure you bookmark them now as all open applications will be automatically closed. Also, make sure you know the passwords for all websites as cookies will also be removed. The use of an external password manager is highly recommended instead of using your browser to store passwords.

NOTE-3: As part of this fix it will also reset the network to default settings including the firewall. If you have custom firewall rules you need to save please export or save them first before running this fix.

The following directories are emptied:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome, and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Discord cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

Important: items are permanently deleted. They are not moved to quarantine. If you have any questions or concerns please ask before running this fix.

The system will be rebooted after the fix has run.

fixlist.txt

Thanks

 

Link to post
Share on other sites

  • 4 weeks later...
  • Root Admin

Due to the lack of feedback, this topic is closed to prevent others from posting here.

If you need this topic reopened, please send a Private Message to any one of the moderating team members. Please include a link to this topic with your request.

This applies only to the originator of this topic. Other members who need assistance please start your own topic in a new thread.

Tips to help protect from infection

Thanks

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.