Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Clicked link in phishing email titled: You have 1 new google doc message


  • Please log in to reply
7 replies to this topic

#1 btyf

btyf

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 16 November 2014 - 04:28 PM

I’ve received an email from one of my contacts which I was expecting to get some documents from, a minute too late I realized that I clicked the link in a phishing email sent from his address and think I also clicked "add to white list", in a dialog from bitdefender.

Running bitdefender it found some malware and took care of them.

I can’t detect any suspicious activity on my machine.

How can I tell if the system is infected?

 

Email message title: You have 1 new google doc message

Email message body: Please view the document i uploaded for you using Google docs.

 

View Now

 

 

Thank You.

2014 Google Support.

 

 

View now links to:

Warning: remove spaces and exclamation  marks only if you are one of the experts helping, and know what you are doing, otherwise  you’ll fall pray to this scam!

 http://domator !service.pl/ !godo !fmoney/index.html

 

 

Thank you!

 

 

 

 

 



BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • BC Advisor
  • 13,006 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:02 PM

Posted 16 November 2014 - 05:32 PM

It would be of use to know what Bit Defender found and removed. Maybe you could post its log.

 

The obfuscated sending address could of been scraped from the internet, from your address book or from the person's email

address book you were expecting documents from. It could also just have been guessed.

 

Hopefully, Bit Defender removed the threat.

 

No way of knowing for certain what the attachment attempted or installed. Here is a list of programs

often recommended in this forum for finding and removing adware and malware.

 


 

  • download AdwCleaner by Xplode and save to your Desktop.
  • Double-click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator.
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • After reviewing the log, click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars...especially Yahoo.

You may see Google Tool Bar being offered. You can choose to download and use the portable version and avoid any chance

of installing an unwanted toolbar.  

CCleaner - PC Optimization and Cleaning - Free Download

Piriform - How to run CCleaner from a USB drive

 

 

Download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

 

After successfully using the programs above, scan using the programs below that will find and remove malware as well as adware.

 

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR  REVIEW.

 

  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
  • Scan potentially unwanted applications
  • Scan for potentially unsafe applications
  • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

Download TDSSKiller and save it to your desktop.

  • Extract (unzip) its contents to your desktop.
  • Open the TDSSKiller folder and doubleclick on TDSSKiller.exe to run the application, then on Start Scan.
  • If an infected file is detected, the default action will be Cure, click on Continue.
  • If a suspicious file is detected, the default action will be Skip, click on Continue.
  • It may ask you to reboot the computer to complete the process. Click on Reboot Now.
  • If no reboot is require, click on Report. A log file should appear. Please copy and paste the contents of that file here.
  • If a reboot is required, the report can also be found in your root directory (usually C:\ folder) in the form of TDSSKiller_xxxx_log.txt. Please copy and paste the contents of that file here.

Edited by buddy215, 16 November 2014 - 05:33 PM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#3 btyf

btyf
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 18 November 2014 - 03:42 AM

Thank you!

 

 

·         BitdefenderLog (after clicking link):

 

[-]Resolved issues:

Object Path Threat Name Final Status

 

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\9P5Q4OBJ.txt Cookie.TribalFusion Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\4JVGXKOI.txt Cookie.PointRoll Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\A0S34SJI.txt Cookie.Zedo Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\6Q2ZONSV.txt Cookie.Statcounter Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\71OQSAN9.txt Cookie.RealMedia Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\D2YE4JWZ.txt Cookie.Zedo Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\IRIQSQ5I.txt Cookie.DealTime Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\FN6G9D7J.txt Cookie.FastClick Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\G4853ACI.txt Cookie.QuestionMarket Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\LRCMQXMJ.txt Cookie.Mediaplex Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\NU83L8PK.txt Cookie.BurstNet Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\OH61PQBL.txt Cookie.Casalemedia Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\QXJA7FQH.txt Cookie.BS.Serving-Sys Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\U6ZPDJS5.txt Cookie.RealMedia Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\UQCQKX55.txt Cookie.Ru4 Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\VSGFF216.txt Cookie.Advertising Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\XR9YHQ2W.txt Cookie.DoubleClick Deleted

Cookie: C:\Users\uiy\AppData\Roaming\Microsoft\Windows\Cookies\Low\Z2AD6H2S.txt Cookie.PointRoll Deleted

 

 

[-]Detailed Scan Summary

 

[-]Basic

Scanned items : 978850

Infected items : 18

Suspicious items : 0 (no suspected items have been detected)

Resolved items : 18

Unresolved items : 0 (no issues remained unresolved)

 

 

 

·         AdwCleaner after reboot log:

 

# AdwCleaner v4.101 - Report created 17/11/2014 at 01:58:46

# Updated 09/11/2014 by Xplode

# Database : 2014-11-07.1 [Local]

# Operating System : Windows 7 Ultimate Service Pack 1 (64 bits)

# Username : uiy - DELL-BMP1

# Running from : D:\downloads\bleeping\AdwCleaner.exe

# Option : Clean

 

***** [ Services ] *****

 

[#] Service Deleted : vToolbarUpdater17.0.12

 

***** [ Files / Folders ] *****

 

Folder Deleted : C:\Users\uiy\AppData\Roaming\0D0S1L2Z1P1B

 

***** [ Scheduled Tasks ] *****

 

 

***** [ Shortcuts ] *****

 

 

***** [ Registry ] *****

 

Key Deleted : HKLM\SOFTWARE\Classes\AppID\{1F02FB61-2BE5-4C16-8199-AEAA16EB0342}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{25A3A431-30BB-47C8-AD6A-E1063801134F}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{408CFAD9-8F13-4747-8EC7-770A339C7237}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{87BEF026-9269-413C-A5B3-11F35451380E}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B3EAD50C-ECB0-459A-9EDA-F505AB99675B}

Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E57091A7-B5F0-4C42-9329-72ED3E59ED31}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{1A1BBE49-C6F1-40EA-9D2F-262F0AF6DDE3}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{2022154E-7E3E-4809-871E-1B45A6FC7058}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{292ECB89-350E-45D2-816F-52C15305B144}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{36CC2180-B6BF-4951-9578-6B0C40044AAA}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{44A36944-22C6-4A08-BC7C-161F3E540DBF}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{51F04BD6-3888-4849-864C-617FAE709CE0}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{6247DD2C-8CF9-4041-A235-93691D71B8B4}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{835BED79-DF7E-4096-B355-ED43FA2EA87B}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{8E863BD6-50DE-47D0-A6F1-3C1F6DB72451}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9DD36F1E-5111-41C5-ADED-A2A11A2FF3E4}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A2FB8217-E320-434E-BA79-513E357AD54F}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{A9CEBBF4-9129-479A-9231-E833ED3D3A8F}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{AFD4D1F9-167C-4884-95AE-B5A9797B0D16}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{C47788B1-9604-4D7A-A684-F4D450F2D7D2}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{CA3B41D0-D4C1-4808-B248-75DA27238828}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D4A2FF6C-087F-4D40-8DFE-92AAD484BFB8}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{D88B9D5C-A9CF-4C69-906D-1CCA5D85A2EF}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{E4E394E0-D331-431F-B76D-E3A19193D5F6}

Key Deleted : HKLM\SOFTWARE\Classes\Interface\{F83AF01C-AA2F-469F-8BE7-D178FB15FD07}

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{25A3A431-30BB-47C8-AD6A-E1063801134F}

Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\Ext\Settings\{25A3A431-30BB-47C8-AD6A-E1063801134F}

Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{E57091A7-B5F0-4C42-9329-72ED3E59ED31}

Value Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{25A3A431-30BB-47C8-AD6A-E1063801134F}]

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{0923E315-2D8B-48CE-A37C-AE9A42F9711C}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{1A1BBE49-C6F1-40EA-9D2F-262F0AF6DDE3}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{2022154E-7E3E-4809-871E-1B45A6FC7058}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{292ECB89-350E-45D2-816F-52C15305B144}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{36CC2180-B6BF-4951-9578-6B0C40044AAA}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{44A36944-22C6-4A08-BC7C-161F3E540DBF}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{6247DD2C-8CF9-4041-A235-93691D71B8B4}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{79FB5FC8-44B9-4AF5-BADD-CCE547F953E5}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{835BED79-DF7E-4096-B355-ED43FA2EA87B}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{8E863BD6-50DE-47D0-A6F1-3C1F6DB72451}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{9DD36F1E-5111-41C5-ADED-A2A11A2FF3E4}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{A2FB8217-E320-434E-BA79-513E357AD54F}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{A9CEBBF4-9129-479A-9231-E833ED3D3A8F}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{AFD4D1F9-167C-4884-95AE-B5A9797B0D16}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{B3EAD50C-ECB0-459A-9EDA-F505AB99675B}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{C47788B1-9604-4D7A-A684-F4D450F2D7D2}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{CA3B41D0-D4C1-4808-B248-75DA27238828}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{D4A2FF6C-087F-4D40-8DFE-92AAD484BFB8}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{D88B9D5C-A9CF-4C69-906D-1CCA5D85A2EF}

Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{F83AF01C-AA2F-469F-8BE7-D178FB15FD07}

Key Deleted : HKCU\Software\usyndication.com

Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\0FF2AEFF45EEA0A48A4B33C1973B6094

Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\305B09CE8C53A214DB58887F62F25536

Key Deleted : HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GoogleUpdate.exe

 

***** [ Browsers ] *****

 

-\\ Internet Explorer v11.0.9600.17420

 

 

-\\ Google Chrome v27.0.1453.110

 

[C:\Users\idyserver\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : dhdepfaagokllfmhfbcfmocaeigmoebo

[C:\Users\idyserver\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : fbmimoidopbghbcmdmpkjaffffmcbmbg

[C:\Users\idyserver\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : hphibigbodkkohoglgfkddblldpfohjl

[C:\Users\idyserver\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : kdcnnmifdmlmjffdgeieikcokcogpbej

[C:\Users\idyserver\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : kincjchfokkeneeofpeefomkikfkiedl

[C:\Users\idyserver\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : kkkeikdkpjenmoiicggnnodbkebafgpc

[C:\Users\idyserver\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : pgmfkblbflahhponhjmkcnpjinenhlnc

[C:\Users\uiy\AppData\Local\Google\Chrome\User Data\Default\Web Data] - Deleted [Search Provider] : hxxp://nortonsafe.search.ask.com/web?q={searchTerms}&o=APN10506&l=dis&prt=IDSSNAV&chn=retail&geo=US&ver=2014&locale=en_US&gct=sb&qsrc=2869

[C:\Users\uiy\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : dhdepfaagokllfmhfbcfmocaeigmoebo

[C:\Users\uiy\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : fbmimoidopbghbcmdmpkjaffffmcbmbg

[C:\Users\uiy\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : hphibigbodkkohoglgfkddblldpfohjl

[C:\Users\uiy\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : kdcnnmifdmlmjffdgeieikcokcogpbej

[C:\Users\uiy\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : kincjchfokkeneeofpeefomkikfkiedl

[C:\Users\uiy\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : kkkeikdkpjenmoiicggnnodbkebafgpc

 

*************************

 

AdwCleaner[R3].txt - [1395 octets] - [08/11/2013 07:18:06]

AdwCleaner[R4].txt - [7714 octets] - [17/11/2014 01:52:24]

AdwCleaner[S2].txt - [1333 octets] - [08/11/2013 07:27:47]

AdwCleaner[S3].txt - [7639 octets] - [17/11/2014 01:58:46]

 

########## EOF - C:\AdwCleaner\AdwCleaner[S3].txt - [7699 octets] ##########

 

 

 

 

·         Junkware Removal Tool Log

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Junkware Removal Tool (JRT) by Thisisu

Version: 6.3.9 (11.15.2014:2)

OS: Windows 7 Ultimate x64

Ran by iy on Mon 11/17/2014 at  4:36:53.48

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

 

 

 

 

~~~ Services

 

 

 

~~~ Registry Values

 

Successfully repaired: [Registry Value] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Internet Explorer\Main\\Default_Page_URL

 

 

 

~~~ Registry Keys

 

Successfully deleted: [Registry Key - Orphan] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D9C8D61C-A7E4-4CA2-8427-CCAF098EB352}

Successfully deleted: [Registry Key - Orphan] HKEY_CLASSES_ROOT\CLSID\{D9C8D61C-A7E4-4CA2-8427-CCAF098EB352}

Successfully deleted: [Registry Key - Orphan] HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D9C8D61C-A7E4-4CA2-8427-CCAF098EB352}

Successfully deleted: [Registry Key - Orphan] HKEY_CLASSES_ROOT\CLSID\{D9C8D61C-A7E4-4CA2-8427-CCAF098EB352}

 

 

 

~~~ Files

 

 

 

~~~ Folders

 

Successfully deleted: [Folder] "C:\ProgramData\pcdr"

 

 

 

~~~ Event Viewer Logs were cleared

 

 

 

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Scan was completed on Mon 11/17/2014 at  4:51:17.75

End of JRT log

 

 

 

 

 

 

·         Malwarebytes Anti-Malware Log

 

 

Malwarebytes Anti-Malware

www.malwarebytes.org

 

Scan Date: 11/17/2014

Scan Time: 5:10:55 AM

Logfile: mbam.txt

Administrator: Yes

 

Version: 2.00.3.1025

Malware Database: v2014.11.17.02

Rootkit Database: v2014.11.12.01

License: Free

Malware Protection: Disabled

Malicious Website Protection: Disabled

Self-protection: Disabled

 

OS: Windows 7 Service Pack 1

CPU: x64

File System: NTFS

User: iy

 

Scan Type: Threat Scan

Result: Completed

Objects Scanned: 562971

Time Elapsed: 7 min, 21 sec

 

Memory: Enabled

Startup: Enabled

Filesystem: Enabled

Archives: Enabled

Rootkits: Enabled

Heuristics: Enabled

PUP: Warn

PUM: Enabled

 

Processes: 0

(No malicious items detected)

 

Modules: 0

(No malicious items detected)

 

Registry Keys: 0

(No malicious items detected)

 

Registry Values: 0

(No malicious items detected)

 

Registry Data: 0

(No malicious items detected)

 

Folders: 0

(No malicious items detected)

 

Files: 0

(No malicious items detected)

 

Physical Sectors: 0

(No malicious items detected)

 

 

(end)

 

 

 

 

 

·         ESET

 

 

C:\Users\uiy\AppData\Downloads\xf-adobecc.exe   a variant of Win32/Keygen.HA potentially unsafe application            deleted - quarantined

C:\Users\uiy\AppData\Local\Temp\dlmED7D.tmp\mkvplayer.exe  a variant of Win32/InstallCore.PQ potentially unwanted application deleted - quarantined

C:\Windows\Installer\112115b.msi    a variant of Win32/Bundled.Toolbar.Ask.G potentially unsafe application            deleted - quarantined

C:\Windows\Installer\39fa9b.msi      a variant of Win32/Bundled.Toolbar.Ask.G potentially unsafe application            deleted - quarantined

D:\backup_desktopicons\downloads\ccsetup315.exe.mhw463f.partial        Win32/Bundled.Toolbar.Google.E potentially unsafe application            deleted - quarantined

D:\DELL-BMP1\Backup Set 2014-02-23 141650\Backup Files 2014-05-08 030001\Backup files 1.zip         multiple threats deleted - quarantined

D:\DELL-BMP1\Backup Set 2014-05-08 074544\Backup Files 2014-05-08 074544\Backup files 1.zip         multiple threats deleted - quarantined

D:\DELL-BMP1\Backup Set 2014-05-08 074544\Backup Files 2014-05-08 074544\Backup files 2.zip         multiple threats deleted - quarantined

D:\DELL-BMP1\Backup Set 2014-05-19 185853\Backup Files 2014-05-19 185853\Backup files 1.zip         multiple threats deleted - quarantined

D:\DELL-BMP1\Backup Set 2014-05-27 154553\Backup Files 2014-05-27 154553\Backup files 1.zip         multiple threats deleted - quarantined

D:\downloads\cbsidlm-cbsi213-Free_MKV_Player-ORG-75978742.exe       a variant of Win32/CNETInstaller.B potentially unwanted application       deleted - quarantined

D:\downloads\ccsetup315.exe.mhw463f.partial       Win32/Bundled.Toolbar.Google.E potentially unsafe application      deleted - quarantined

D:\FAMILY\backup\ccsetup315.exe   Win32/Bundled.Toolbar.Google.E potentially unsafe application     deleted - quarantined

D:\virustools\AdwCleaner\Quarantine\C\ProgramData\apn\APN-Stub\W3IV6-G\APNIC.7z.vir            Win32/Bundled.Toolbar.Ask.B potentially unsafe application           deleted - quarantined

D:\virustools\AdwCleaner\Quarantine\C\ProgramData\apn\APN-Stub\W3IV6-G\APNIC.dll.vir            Win32/Bundled.Toolbar.Ask.B potentially unsafe application           deleted – quarantined

 

 

 

 

 

·         TDSSKiller

 

No threats found

 

03:16:04.0909 0x1277c  Detected object count: 0

03:16:04.0909 0x1277c  Actual detected object count: 0


Edited by btyf, 18 November 2014 - 03:50 AM.


#4 buddy215

buddy215

  • BC Advisor
  • 13,006 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:02 PM

Posted 18 November 2014 - 04:49 AM

A lot of adware was removed as you can see.

 

You can prevent the Ad/ tracking AKA Third Party cookies from installing that Bit Defender removes.

Disable third-party cookies in IE, Firefox, and Google Chrome | How To - CNET

Once you have blocked the cookies from installing you will need to remove the ones presently installed either using

Bit Defender or CCleaner.

 

Reset Google Chrome

Google Chrome gives you the option to reset your browser settings in one easy click. In some cases, programs that you install can change your Chrome settings without your knowledge. You may see additional extensions and toolbars or a different search engine. Resetting your browser settings will reset the unwanted changes caused by installing other programs. However, your saved bookmarks and passwords will not be cleared or changed.

Reset your browser settings
  1. In the top-right corner of the browser window, click the Chrome menu
  2. Select Settings.
  3. At the bottom, click Show advanced settings.
  4. Under the section "Reset settings,” click Reset settings.
  5. In the dialog that appears, click Reset.

You should delete all but the last System Restore points since some contain adware/ possibly malware.

Instructions for doing that if needed:

– Click Start
– Type clean in the Start Search box.
– Click Disk Cleanup from the search results list.
– Select Files from All Users on this computer option.
– Click OK on Disk Space Cleanup Manager for Windows User Access Control permission request dialog.
– Choose a drive letter from the drop down list, and press OK.
– Disk Cleanup will perform calculation to determine how much space it can free. Once done, click on More Options tab.
– Under the section of System Restore and Shadow Copies, click on Clean up… button.

clean1.png

– Click on Delete button when Windows asks whether you are sure you want to delete all but the most recent restore point.
– Disk Cleanup will erase all old restore points or files -except for the most recent restore point.

 

After completing the above you should be good to go.

Happy surfin' !


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#5 btyf

btyf
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:03:02 AM

Posted 24 November 2014 - 06:24 AM

Thank you very much! Your help is greatly appreciated!



#6 buddy215

buddy215

  • BC Advisor
  • 13,006 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:02 PM

Posted 25 November 2014 - 10:18 AM

You're welcome...happy surfin'


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#7 Champi

Champi

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:09:02 AM

Posted 19 June 2015 - 07:59 PM

Hi there,

Thank you very much for this topic. It has been very useful for me. Unfortunately, I also clicked the link to see the document, but from my iPhone. Inbox, the Google App I use to see my email, didn't warn me when I was checking the email on the iPhone, I clicked. Seeing that it was taking me to what seemed a non-existent link, I went to my iPad, and when opened the email, then Google was warning me that it might be phishing. Too late since I already clicked it on the iPhone. What can I do? will have it infected my iPhone? My gmail account has been compromised?

Is there any recommendation I could follow?

Thank you very much in advance!

Champi

#8 buddy215

buddy215

  • BC Advisor
  • 13,006 posts
  • ONLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:07:02 PM

Posted 20 June 2015 - 06:51 AM

Welcome to BC !

 

If the phishing attempt contained malicious software designed to work only on Windows...which almost all malicious software is...then all that's needed is to

delete the email.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users