Jump to content

Recommended Posts

Hello @maple1  and  :welcome:

 

My name is MKDB and I will assist you.

 

 

Let's keep these principles as we proceed. Make sure to read the entire post below first.

  • Please follow the steps in the given order and post back the log files.
  • Please copy and paste all log files into your post.
  • Before we start, please make sure that you have an external backup, not connected to this system, of all private data.
  • Only run the tools I guide you to. Please don't run any other scans, download, install or uninstall any programs while I'm working with you.
  • As English is not my native language, please do not use slang or idioms. It may be hard for me to understand.
  • If you do not respond within 4 days, your topic will be closed.
  • Cracked or hacked or pirated programs are not only illegal, but also will make a computer a malware victim. Having such programs installed, is the easiest way to get infected. It is the leading cause of ransomware encryptions. It is at times also a big source of current trojan infections. If you are running any kin of illegal software on your system, please uninstall them now, before we start the cleaning procedure.

 

 

Delete just the single value ("production").

Which tools did you use to remove the infection?

We can have a look on your system to check for other orphans. If you are interested in it, please run FRST.

 

 

Step 1

Please download the suitable version of Farbar Recovery Scan Tool (FRST) and save it to your desktop: 32bit | 64bit

 

 

Edited by MKDB
Link to post
Share on other sites

Before I run FRST is it OK to connect to my wifi network(can the orphans spread over my network?) And I used windows defender initially to get rid of the malware and I do not have and have never had any Anti-Malware service other than malwarebytes and windows defender never any "cracked" software of any kind on my PC either one last thing will a ghost copy work instead of a external backup?

Link to post
Share on other sites

Hi @maple1,

 

yes, we need to connect to wifi network for FRST to work correct, but those orphans should not do any harm to your system.

I would prefer an external backup, but a ghost copy is better than nothing.

Link to post
Share on other sites

Thank you @maple1.

 

We will start with a FRST fix in order to remove some orphans, empty entries and adware related elements.

Moreover, this fix will check windows system files and repairs them if needed.

So it may some time (>> 15 min), so please be very patient during the fix.

 

 

 

Step 1

  • Please download the attached fixlist.txt file and save it to the location where you ran FRST from ( C:\Users\willm\Desktop\ ).

Note: It's important that both files, FRST and fixlist.txt are in the same location or the fix will not work.

  • Close all open programs and save your work.
  • Run FRST again.
  • Press the FIX button only once and wait.
  • Please be patient and do not interfere, even if FRST does not respond for some time. That's nothing to worry about.
  • Please note: This Fix will remove all temporary files, empty recycle bin and will remove cookies and my result in some websites indicating they do not recognize your computer. It may be necessary to receive and apply a verification code.
  • Please note: This step resets your Firewall settings and you may be asked later to grant permission for legitimate programs to pass through the Firewall. If you recognize the program, agree to the request.
  • If the tool needs a restart, please make sure you let the system restart normally and let the tool complete its run after restart.
  • FRST will create one log now (Fixlog.txt) in the same directory the tool is run.
  • Please attach this logfile to your next reply.

 

 

 

fixlist.txt

Link to post
Share on other sites

  • Root Admin

Temporary files are just that temporary. The equivalent of trash in your home that you take out to the larger cans each night and then out to the curb each week. There is no need to keep temporary files.

As for browser cache that too is not something one would normally keep. It's often recommended that one clean that up periodically as well.

https://support.google.com/accounts/answer/32050?hl=en&co=GENIE.Platform%3DDesktop

 

The following directories are emptied:

  • Windows Temp
  • Users Temp folders
  • Edge, IE, FF, Chrome, and Opera caches, HTML5 storages, Cookies and History
  • Recently opened files cache
  • Discord cache
  • Java cache
  • Steam HTML cache
  • Explorer thumbnail and icon cache
  • BITS transfer queue (qmgr*.dat files)
  • Recycle Bin

 

Thanks

 

Link to post
Share on other sites

i dont mean to be obnoxious [sorry i could not send this in the last reply i did not know of it before] but it appears you are trying to delete nahimic i was wondering if you are deleting it or something else because my computer is a msi laptop and i just would like to know if the fix list should be changed before i run it or if that is malware and it does need to be deleted 

Link to post
Share on other sites

  • Root Admin

Sorry about that. The arguments is probably what prompted the removal.

Please find and upload this file to VirusTotal for scanning  https://virustotal.com

C:\Program Files\Nahimic\Nahimic2\UserInterface\Nahimic2svc32.exe
C:\Program Files\Nahimic\Nahimic2\UserInterface\x64\Nahimic2svc64.exe
C:\Program Files\Nahimic\Nahimic2\UserInterface\Nahimic2UILauncher.exe

 

If shown safe then remove those entries from the log and then run the fix.

Task: {95DA4654-16A1-471F-A0B5-674348735089} - System32\Tasks\Nahimic2svc32Run => "C:\Program Files\Nahimic\Nahimic2\UserInterface\Nahimic2svc32.exe"  $(Arg0) $(Arg1) $(Arg2) $(Arg3) $(Arg4) $(Arg5) $(Arg6) $(Arg7) (No File)
Task: {BFA85DE4-67BE-432A-81D3-0DEA69919D60} - System32\Tasks\Nahimic2svc64Run => "C:\Program Files\Nahimic\Nahimic2\UserInterface\x64\Nahimic2svc64.exe"  $(Arg0) $(Arg1) $(Arg2) $(Arg3) $(Arg4) $(Arg5) $(Arg6) $(Arg7) (No File)
Task: {F3A349DB-B42A-4CD4-8603-FA9697C70F35} - System32\Tasks\Nahimic2UILauncherRun => "C:\Program Files\Nahimic\Nahimic2\UserInterface\Nahimic2UILauncher.exe"  $(Arg0) $(Arg1) $(Arg2) $(Arg3) $(Arg4) $(Arg5) $(Arg6) $(Arg7) (No File)

 

Edited by AdvancedSetup
Updated information
Link to post
Share on other sites

  • Root Admin

Please open an elevated Admin command prompt. The copy and past the following and then post back the results.

DIR /A /S "C:\Program Files\Nahimic\*.*"

My guess is that returns nothing too.

It looks like I was wrong about this.

The Nahimic drivers do not use that install folder structure from what I can find.

https://www.edtittel.com/blog/a-volute-software-component-mystery-solved.html

These are the more typical installation folders

C:\Windows\System32\A-Volute

C:\Program Files\WindowsApps\RealtekSemiconductorCorp.RealtekAudioControl_1.39.279.0_x64__dt26b99r8h8gj\RtkAudioComponent\Assets\msi

AppData\Local\Packages\B9ECED6F.ArmouryCrate_qmba6cd70vzyy\LocalState\SupportTemp\Realtek Audio Driver\USBAud\Win64\ThirdParty\APO

 

So, it looks like the Removal that @MKDB is doing looks to be a valid removal.

 

Link to post
Share on other sites

  • Root Admin

My guess would be that Windows probably updates some items. @MKDB should be with you later today or tonight to follow up.

In the meantime while we're waiting, please gather some fresh updated logs.

 

To begin, please do the following so that we may take a closer look

NOTE: The tools and the information obtained are safe and not harmful to your privacy or your computer, please allow the programs to run if blocked by your system.

  • Download the Malwarebytes Support Tool
  • In your Downloads folder, open the mb-support-x.x.x.xxx.exe file
  • In the User Account Control pop-up window, click Yes to continue the installation
  • Run the MBST Support Tool
  • In the left navigation pane of the Malwarebytes Support Tool, click Advanced
  • In the Advanced Options, click Gather Logs. A status diagram displays the tool is Getting logs from your machine
  • A zip file named mbst-grab-results.zip will be saved to the Public desktop, please upload that file on your next reply

Thank you

 

Link to post
Share on other sites

  • Root Admin

No problem. @MKDB will have more for you to do once he comes back online @maple1

Some items I notice are the following

1. You have a very old installation of Java. That should be uninstalled that poses a risk to system security

2. Your hard drive is nearly full but is also very small for an installation of Windows 10
     Drive c: (OS_Install) (Fixed) (Total:117.94 GB) (Free:8.05 GB) (Model: TOSHIBA THNSNJ128G8NU) NTFS

      You should have System Restore enabled, but your space is already very low. I would highly recommend you consider purchasing a new larger hard drive and reinstall Windows 11 on it.

     ATTENTION: System Restore is disabled (Total:117.94 GB) (Free:8.05 GB) (7%)

3. I'd recommend changing your DNS provider as well
    DNS Servers: 192.168.1.1

 

 

 

Link to post
Share on other sites

@AdvancedSetup

Thanks for your input in this topic, I do really appreciate it.

 

@maple1

You did a very good job by running the FRST fix and creating new logfiles. Those logfiles now look much better.

Please note the mentioned items by AdvancedSetup.

 

In a next step, I would like you to run Adwcleaner and a special search with FRST to search for more leftovers.

Moreover, I would like you to run ESET Online Scanner.

 

 

 

Step 1

Please download AdwCleaner and save it to your desktop.

  • Double-click to run it.
  • Accept the End User License Agreement.
  • Click Scan Now.
  • When finished, if items are found please click Next / Quarantine.
  • Maybe your PC will be rebooted, AdwCleaner will be opened automatically.
  • Click View Log File.
  • AdwCleaner will open one log (AdwCleaner[Cxx].txt).
  • Please attach the log to your next reply.

 

 

Step 2

  • Run FRST again.
  • Copy and paste the whole content of the following code box into the search field:
SearchAll: BrowserAssistant;Browser Assistant
  • Press the Search files button. Please be patient, this scan may take some time.
  • FRST will create one log now (Search.txt) in the same directory the tool is run.
  • Please attach this logfile to your next reply.

 

 

Step 3

Let me have you run a different scanner to double-check. I don't expect it to find anything, but no harm in checking.

I would suggest a free scan with the ESET Online Scanner

Go to https://download.eset.com/com/eset/tools/online_scanner/latest/esetonlinescanner.exe

  • It will start a download of "esetonlinescanner.exe".
  • Save the file to your system, such as the Downloads folder, or else to the Desktop.
  • Go to the saved file, and double click it to get it started. 
  • When presented with the initial ESET options, click on "Computer Scan".
  • Next, when prompted by Windows, allow it to start by clicking Yes.
  • When prompted for scan type, Click on Full scan
  • Look at & tick  ( select )   the radio selection "Enable ESET to detect and quarantine potentially unwanted applications"   and click on the Start scan button.
  • Have patience.  The entire process may take an hour or more. There is an initial update download.
  • There is a progress window display.
  • You should ignore all prompts to get the ESET antivirus software program.  (e.g. their standard program). You do not need to buy or get or install anything else.
  • When the scan is completed, if something was found, it will show a screen with the number of detected items.  If so, click the button marked “View detected results”.
  • Click The blue “Save scan log” to save the log.
  • If something was removed and you know it is a false finding, you may click on the blue ”Restore cleaned files”  (in blue, at the bottom).
  • Press Continue when all done.  You should click to off the offer for “periodic scanning”.

Note: If you do need to do a File Restore from ESET please follow the directions below

[KB2915] Restore files quarantined by the ESET Online Scanner version 3

https://support.eset.com/en/kb2915-restore-files-quarantined-by-the-eset-online-scanner

 

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.