Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Unknown malware/adware.


  • Please log in to reply
15 replies to this topic

#1 colt45

colt45

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 01 February 2015 - 07:48 PM

In the past few days I've been having pop ups and ads on my Chrome Browser.   Chrome update policies also seem to be getting messed with.  The only thing I can think of that would have caused the issue is a AndroidSDK file i was trying to download.  Instead of the expected file, it downloaded some .exe that started an install process, I tried to abort the install but I think i was too late.  I'm getting pop ups, browswer redirects, and ads on all webpages, even with adblock installed. Any help is appreciated.

Edit: Topic moved from Virus, Trojan, Spyware, and Malware Removal Logs to the more appropriate forum. ~ Animal

BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,262 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:20 AM

Posted 01 February 2015 - 09:00 PM

The programs below have a good track record of finding and removing most adware and malware.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR REVIEW.

  • download AdwCleaner by Xplode and save to your Desktop.
  • Double-click on AdwCleaner.exe to run the tool.
    Vista/Windows 7/8 users right-click and select Run As Administrator.
  • Click on the Scan button.
  • AdwCleaner will begin...be patient as the scan may take some time to complete.
  • After the scan has finished, click on the Report button...a logfile (AdwCleaner[R0].txt) will open in Notepad for review.
  • After reviewing the log, click on the Clean button.
  • Press OK when asked to close all programs and follow the onscreen prompts.
  • Press OK again to allow AdwCleaner to restart the computer and complete the removal process.
  • After rebooting, a logfile report (AdwCleaner[S0].txt) will open automatically.
  • Copy and paste the contents of that logfile in your next reply.
  • A copy of all logfiles are saved in the C:\AdwCleaner folder which was created when running the tool.

Download Junkware Removal Tool to your desktop.

  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.

Hold down Control and click on this link to open ESET OnlineScan in a new window. (Eset can take more than an hour to run so plan accordingly)

  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • Click Advanced settings and select the following:
  • Scan potentially unwanted applications
  • Scan for potentially unsafe applications
  • Enable Anti-Stealth technology
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 01 February 2015 - 09:09 PM

Before you replied, I decided to run Malwarebytesarrow-10x10.png, I used the default settings, no rootkit scanning.  Heres the log anyway.  Now I'm going to go ahead and complete the rest of the steps. thanks.
 
www.malwarebytes.org
 
Scan Date: 2/1/2015
Scan Time: 6:54:16 PM
Logfile: 
Administrator: Yes
 
Version: 2.00.4.1028
Malware Database: v2015.02.01.07
Rootkit Database: v2015.01.14.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windowsarrow-10x10.png 7 Service Pack 1
CPU: x64
File System: NTFS
User: Colton
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 326442
Time Elapsed: 5 min, 19 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 1
PUP.Optional.TampaGeneration.A, C:\Programarrow-10x10.png Files (x86)\TampaGeneration\TampaGeneration.dll, Delete-on-Reboot, [2d1e7c9dcac041f5ae1f96ebf60da759], 
 
Registryarrow-10x10.png Keys: 30
Trojan.Agent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{AD11DADE-C597-45D9-D8C5-1D2EB0B89613}, Quarantined, [64e795841c6eb68046f96e9642c06997], 
Trojan.Agent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{4CEE92A3-9F0C-51AB-ADC0-34EC24AD7B7E}, Quarantined, [94b764b52b5fe4524cf325df0df5c43c], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\CLSID\{07c45e2b-01b9-4ce4-84c4-becfccd432e8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\CLASSES\P07c45e2b_01b9_4ce4_84c4_becfccd432e8_.P07c45e2b_01b9_4ce4_84c4_becfccd432e8_, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\CLASSES\P07c45e2b_01b9_4ce4_84c4_becfccd432e8_.P07c45e2b_01b9_4ce4_84c4_becfccd432e8_.9, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\P07c45e2b_01b9_4ce4_84c4_becfccd432e8_.P07c45e2b_01b9_4ce4_84c4_becfccd432e8_, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\P07c45e2b_01b9_4ce4_84c4_becfccd432e8_.P07c45e2b_01b9_4ce4_84c4_becfccd432e8_.9, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWAREarrow-10x10.png\CLASSES\CLSID\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\CLASSES\CLSID\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}\INPROCSERVER32, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKU\S-1-5-21-984496139-4104290956-2516001670-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWSarrow-10x10.png\CURRENTVERSION\EXT\SETTINGS\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKU\S-1-5-21-984496139-4104290956-2516001670-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\PREAPPROVED\{07C45E2B-01B9-4CE4-84C4-BECFCCD432E8}, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
Trojan.Agent, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{4820778D-AB0D-6D18-C316-52A6A0E1D507}, Quarantined, [1a3192874e3c9b9bf649a163c53d8c74], 
PUP.Optional.FastSearchings, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORERarrow-10x10.png\SEARCHSCOPES\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}, Quarantined, [c9820415e1a9b2844c45d7295ca9bc44], 
PUP.Optional.Booster.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}{d65a1a66}, Quarantined, [18338693167439fdb0991a8b5ca7d927], 
PUP.Optional.MultiPlug, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{4820778D-AB0D-6D18-C316-52A6A0E1D507}, Quarantined, [a5a627f27b0fd95dde370692ba49f709], 
PUP.Optional.TampaGeneration.A, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\d65a1a66, Quarantined, [e8639b7e028877bf2ca0513007fce31d], 
PUP.Optional.WebSearchInfo, HKU\S-1-5-21-984496139-4104290956-2516001670-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}, Quarantined, [311a83964e3c7cba7ac723cad72dd42c], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\TYPELIB\{E0D6077D-7186-48B2-A6C6-2F7C533E8CFF}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\INTERFACE\{0F19EF48-CB8C-416A-B84C-C33B02970632}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\INTERFACE\{382F6195-1B46-40D5-B9FD-0493263E6132}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\CLASSES\INTERFACE\{DFF50D27-9859-4F50-9BE1-A4CBFA102B9D}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{0F19EF48-CB8C-416A-B84C-C33B02970632}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{382F6195-1B46-40D5-B9FD-0493263E6132}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\INTERFACE\{DFF50D27-9859-4F50-9BE1-A4CBFA102B9D}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, HKLM\SOFTWARE\WOW6432NODE\CLASSES\TYPELIB\{E0D6077D-7186-48B2-A6C6-2F7C533E8CFF}, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.TheAdBlock.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{37476589-E48E-439E-A706-56189E2ED4C4}_is1, Quarantined, [90bb45d496f4be7820ea78fbca39ad53], 
 
Registry Values: 1
PUP.Optional.WebSearchInfo, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES|DefaultScope, {BB74DE59-BC4C-4172-9AC4-73315F71CFFE}, Quarantined, [410a32e797f3be788e3d60a2986d0ef2]
 
Registry Data: 2
PUP.Optional.TheSearchPage.A, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, http://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74, Good: (www.google.com), Bad: (http://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74),Replaced,[b299ce4bb5d5b482f592129071940000]
PUP.Optional.TheSearchPage.A, HKU\S-1-5-21-984496139-4104290956-2516001670-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, http://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74, Good: (www.google.com), Bad: (http://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74),Replaced,[183302173d4d181ef197ddc509fcbf41]
 
Folders: 3
PUP.Optional.TampaGeneration.A, C:\Program Files (x86)\TampaGeneration, Delete-on-Reboot, [2d1e7c9dcac041f5ae1f96ebf60da759], 
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.TheAdBlock.A, C:\ProgramData\TheAdBlock, Quarantined, [90bb45d496f4be7820ea78fbca39ad53], 
 
Files: 17
PUP.Optional.Bundler, C:\ProgramData\{fb96ae73-addf-c32b-fb96-6ae73addb9ce}\AndroidSDKSlim.zip.exe, Quarantined, [55f6f72263271125e493eab60cf93dc3], 
Trojan.Agent, C:\Program Files (x86)\Diablo III Server Status\Diablo III Server Status.exe, Quarantined, [64e795841c6eb68046f96e9642c06997], 
Trojan.Agent, C:\Program Files (x86)\unaiSaleS\unaiSaleS.exe, Quarantined, [94b764b52b5fe4524cf325df0df5c43c], 
PUP.Optional.MultiPlug.A, C:\Program Files (x86)\youtubeadblocker\Aj2WKU3LTpxyhw.dll, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
PUP.Optional.MultiPlug.A, C:\Program Files (x86)\youtubeadblocker\Aj2WKU3LTpxyhw.x64.dll, Quarantined, [1c2f29f0068496a0a7614a55d5305aa6], 
Trojan.Agent, C:\Program Files (x86)\youtubeadblocker\Aj2WKU3LTpxyhw.exe, Quarantined, [1a3192874e3c9b9bf649a163c53d8c74], 
PUP.Optional.Bundler, C:\Users\Colton\AppData\Local\Temp\9339\temp\AndroidSDKSlim.zip.exe, Quarantined, [7dce58c1deac2313ee896e326f96cd33], 
PUP.Optional.EZDownloader.A, C:\Users\Colton\AppData\Local\Temp\9339\temp\EzDownloader_setup.exe, Quarantined, [55f62ceddeaca98ded1373ad1ee20000], 
PUP.Optional.MultiPlug.A, C:\Users\Colton\AppData\Local\Temp\9339\temp\hpds_setup.exe, Quarantined, [df6cde3b4545290d768aaa813fc318e8], 
PUP.Optional.Bundler, C:\Users\Colton\Downloadsarrow-10x10.png\AndroidSDKSlim.zip (1).exe, Quarantined, [49023bde42482d0927509e02e520c937], 
PUP.Optional.Bundler, C:\Users\Colton\Downloads\AndroidSDKSlim.zip.exe, Quarantined, [e26988915733be78db9ce5bbf21313ed], 
PUP.Optional.TampaGeneration.A, C:\Programarrow-10x10.png Files (x86)\TampaGeneration\TampaGeneration.dll, Delete-on-Reboot, [2d1e7c9dcac041f5ae1f96ebf60da759], 
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker\Aj2WKU3LTpxyhw.dat, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker\Aj2WKU3LTpxyhw.exe, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.Multiplug, C:\Program Files (x86)\youtubeadblocker\Aj2WKU3LTpxyhw.tlb, Quarantined, [3b108099068469cd58f82a20f70c718f], 
PUP.Optional.TheAdBlock.A, C:\ProgramData\TheAdBlock\TheAdBlock.exe, Quarantined, [90bb45d496f4be7820ea78fbca39ad53], 
PUP.Optional.TheSearchPage.A, C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\Preferences, Good: (), Bad: (      "startup_urls": [ "http://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74" ],), Replaced,[82c99881602ac5717a157b6c966f39c7]
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)


#4 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 01 February 2015 - 09:27 PM

Heres the log from the second run

 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 2/1/2015
Scan Time: 7:13:53 PM
Logfile: Malwarebytes Log 2-1-15.txt
Administrator: Yes
 
Version: 2.00.4.1028
Malware Database: v2015.02.01.07
Rootkit Database: v2015.01.14.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Colton
 
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 324421
Time Elapsed: 8 min, 51 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 0
(No malicious items detected)
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 1
PUP.Optional.TheSearchPage.A, C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\Preferences, Good: (), Bad: (      "startup_urls": [ "http://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74" ],), Replaced,[b1a0ee092b5e82b4c2cda542d92c867a]
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)


#5 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 01 February 2015 - 09:36 PM

# AdwCleaner v4.109 - Report created 01/02/2015 at 19:32:14
# Updatedarrow-10x10.png 24/01/2015 by Xplode
# Database : 2015-01-26.1 [Live]
# Operating System : Windowsarrow-10x10.png 7 Ultimate Service Pack 1 (64 bits)
# Username : Colton - COLTON-PC
# Running from : C:\Users\Colton\Desktop\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\ProgramData\17765836379289466919
Folder Deleted : C:\ProgramData\f68cee0f3d42b827
Folder Deleted : C:\Programarrow-10x10.png Files (x86)\5a0Coupons
Folder Deleted : C:\Program Files (x86)\ChuEapiMee
Folder Deleted : C:\Program Files (x86)\CouupExtensioN
Folder Deleted : C:\Program Files (x86)\DownSaovee
Folder Deleted : C:\Program Files (x86)\NetoCeouPPonn
Folder Deleted : C:\Program Files (x86)\unaiSaleS
Folder Deleted : C:\ProgramData\lgfpomhemoacbpfkgcjbhhcjhpnmfalh
Folder Deleted : C:\ProgramData\nngdoadhkkaphgfdngopdcibpbabiifj
Folder Deleted : C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\Extensions\pdanbocphccpmidkhloklnlfplehiikb
 
***** [ Scheduled Tasks ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registryarrow-10x10.png ] *****
 
Key Deleted : HKLM\SOFTWAREarrow-10x10.png\Classes\P2009d0f8_1889_4e84_a7c0_b22609c69e8c_.P2009d0f8_1889_4e84_a7c0_b22609c69e8c_
Key Deleted : HKLM\SOFTWARE\Classes\P2009d0f8_1889_4e84_a7c0_b22609c69e8c_.P2009d0f8_1889_4e84_a7c0_b22609c69e8c_.9
Key Deleted : HKLM\SOFTWARE\Classes\P324b8881_38c1_48af_8741_4709617121d6_.P324b8881_38c1_48af_8741_4709617121d6_
Key Deleted : HKLM\SOFTWARE\Classes\P324b8881_38c1_48af_8741_4709617121d6_.P324b8881_38c1_48af_8741_4709617121d6_.9
Key Deleted : HKLM\SOFTWARE\Classes\P653ddce0_9c07_41f0_acab_b035449f9917_.P653ddce0_9c07_41f0_acab_b035449f9917_
Key Deleted : HKLM\SOFTWARE\Classes\P653ddce0_9c07_41f0_acab_b035449f9917_.P653ddce0_9c07_41f0_acab_b035449f9917_.9
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{2009d0f8-1889-4e84-a7c0-b22609c69e8c}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{324b8881-38c1-48af-8741-4709617121d6}
Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{653ddce0-9c07-41f0-acab-b035449f9917}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{230332DF-D235-47EE-BC42-60860EF144CD}
Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{5D6736D5-0D77-46CE-9906-C4B2C679BF88}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{2009d0f8-1889-4e84-a7c0-b22609c69e8c}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{324b8881-38c1-48af-8741-4709617121d6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{653ddce0-9c07-41f0-acab-b035449f9917}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{2009d0f8-1889-4e84-a7c0-b22609c69e8c}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{324b8881-38c1-48af-8741-4709617121d6}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{653ddce0-9c07-41f0-acab-b035449f9917}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{324b8881-38c1-48af-8741-4709617121d6}
Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{653ddce0-9c07-41f0-acab-b035449f9917}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{324b8881-38c1-48af-8741-4709617121d6}
Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{653ddce0-9c07-41f0-acab-b035449f9917}
Key Deleted : HKCU\Software\AppDataLow\{4A0F38A9-FE55-4B89-B73F-E60FDC0F72E9}
Key Deleted : HKCU\Software\AppDataLow\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
Key Deleted : HKLM\SOFTWARE\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Deleted : HKLM\SOFTWARE\{4A0F38A9-FE55-4B89-B73F-E60FDC0F72E9}
Key Deleted : HKLM\SOFTWARE\{12DA0E6F-5543-440C-BAA2-28BF01070AFA}
Key Deleted : HKLM\SOFTWARE\{12A61307-94CD-4F8E-94BC-918E511FAA81}
 
***** [ Browsers ] *****
 
-\\ Internet Explorerarrow-10x10.png v11.0.9600.17496
 
 
-\\ Google Chrome v39.0.2171.99
 
[C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : lgfpomhemoacbpfkgcjbhhcjhpnmfalh
[C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Extension] : pdanbocphccpmidkhloklnlfplehiikb
[C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74
 
*************************
 
AdwCleaner[R0].txt - [4562 octets] - [01/02/2015 19:29:05]
AdwCleaner[S0].txt - [4549 octets] - [01/02/2015 19:32:14]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S0].txt - [4609 octets] ##########
 


#6 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 01 February 2015 - 09:43 PM

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.4.1 (12.28.2014:1)
OS: Windowsarrow-10x10.png 7 Ultimate x64
Ran by Colton on Sun 02/01/2015 at 19:39:34.62
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registryarrow-10x10.png Values
 
 
 
~~~ Registry Keys
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scanarrow-10x10.png was completed on Sun 02/01/2015 at 19:41:37.83
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 


#7 buddy215

buddy215

  • Moderator
  • 13,262 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:20 AM

Posted 01 February 2015 - 11:12 PM

After Eset scan has finished:

rerun AdwCleaner and post the results.

Reset Google Chrome

 

Google Chrome gives you the option to reset your browser settings in one easy click. In some cases, programs that you install can change your Chrome settings without your knowledge. You may see additional extensions and toolbars or a different search engine. Resetting your browser settings will reset the unwanted changes caused by installing other programs. However, your saved bookmarks and passwords will not be cleared or changed.

Reset your browser settings
  1. In the top-right corner of the browser window, click the Chrome menu
  2. Select Settings.
  3. At the bottom, click Show advanced settings.
  4. Under the section "Reset settings,” click Reset settings.
  5. In the dialog that appears, click Reset.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#8 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 02 February 2015 - 04:47 AM

F:\old windowsarrow-10x10.png 7\Desktop\s3 backup\sd card\TitaniumBackup\com.dexetra.iris-3567ec0da7e3ed541ea00eefe51266fb.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old windows 7\Desktop\s3 backup\sd card\TitaniumBackup\com.heytell-f9ccc11ffd5e0d09f8f452c89cab7944.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old windows 7\Desktop\s3 backup\sd card\TitaniumBackup\com.zeptolab.ctr.paid-8c5496d34dd5a655f90ae3c6a0af225d.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old windows 7\Desktop\s3 backup\sd card\TitaniumBackup\mobiarrow-10x10.png.mgeek.TunnyBrowser-b32e904a89df7510548bb253d28cbce0.apk.gz a variant of Android/AdDisplay.Waps.G potentially unwanted application deleted - quarantined
F:\old windows 7\Desktop\s3 backup\sd card\TitaniumBackup\org.orangenose.games-6f3def35bf7e89dbbb4164c1432483a0.apk.gz Android/SMSreg.AK potentially unsafe application deleted - quarantined
F:\old windows 7\Desktop\s3 backup\sd card\TitaniumBackup\org.yaaic-d076010bd3ce316be9a34cd3d79cfc99.apk.gz a variant of Android/Pircob.A potentially unsafe application deleted - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\5a0Coupons\vD2ngWayudFOSB.dll.vir a variant of Win32/Adware.MultiPlug.EG application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\ChuEapiMee\Fdz1LSnM9kx9K1.dll.vir a variant of Win32/Adware.MultiPlug.EG application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\Program Files (x86)\DownSaovee\wjivcHAJAUYoTs.dll.vir a variant of Win32/Adware.MultiPlug.EG application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\ProgramData\lgfpomhemoacbpfkgcjbhhcjhpnmfalh\content.js.vir JS/Chromex.Agent.L trojanarrow-10x10.png cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\ProgramData\lgfpomhemoacbpfkgcjbhhcjhpnmfalh\GrH9O95.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\ProgramData\nngdoadhkkaphgfdngopdcibpbabiifj\lsdb.js.vir JS/Adware.MultiPlug.B application cleaned by deleting - quarantined
C:\AdwCleaner\Quarantine\C\ProgramData\nngdoadhkkaphgfdngopdcibpbabiifj\MpRv.js.vir JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\Extensions\pcgjnifdiefhdmgignhfmecbpjbpplmj\154\content.js JS/Adware.MultiPlug.B application cleaned by deleting - quarantined
C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\Extensions\pcgjnifdiefhdmgignhfmecbpjbpplmj\154\R.js JS/Kryptik.ATB trojan cleaned by deleting - quarantined
C:\Users\Colton\Downloadsarrow-10x10.png\ccsetup502.exe Win32/Bundled.Toolbar.Google.D potentially unsafe application deleted - quarantined
F:\C Downloads\CrystalDiskInfo6_1_8-en.exe Win32/OpenCandy potentially unsafe application deleted - quarantined
F:\C Downloads\Windows Loader v2.2.1. DAZ crack 7 DeGun TPB.zip Win32/HackTool.WinActivator.I potentially unsafe application deleted - quarantined
F:\C Downloads\Windows Loader v2.2.1. DAZ crack 7 DeGun TPB\Windows Loader\Windows Loader.exe Win32/HackTool.WinActivator.I potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\clockworkmod\backup\2012-02-24.15.42.13_BlackICE.v1.28b9\data.ext4.tar a variant of Android/AdDisplay.Waps.G potentially unwanted application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\com.dexetra.iris-441222ea461cf3bc9f4521acc1e8a4c3.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\com.heytell-e6f8788f3e7f3fbde95a6ea03a3949c1.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\com.omgpop.dstfree-99ca2ff57a6556f3a678c5a0f9f5a39b.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\com.zeptolab.ctr.paid-21059a65c6cd3039c4a8980e2ac9883c.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\com.zynga.words-a4758de78a165d28e8edd5c00889b2b4.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\mobiarrow-10x10.png.mgeek.TunnyBrowser-b32e904a89df7510548bb253d28cbce0.apk.gz a variant of Android/AdDisplay.Waps.G potentially unwanted application deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\mobi.SyndicateApps.ICSv2-95bd94eb594665061ed6d755118e9396.apk.gz Android/Plankton.H trojan deleted - quarantined
F:\old data drive\SD Card Backups\03-22-2012\TitaniumBackup\net.zedge.android-1ead321e5bb8873d6ff100ebf2734d97.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\1-10-12\TitaniumBackup\com.zeptolab.ctr.paid-21059a65c6cd3039c4a8980e2ac9883c.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\1-10-12\TitaniumBackup\com.zynga.words-ea07d2ecb685da265bc32e06f1e60f85.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\1-10-12\TitaniumBackup\mobi.mgeek.TunnyBrowser-b32e904a89df7510548bb253d28cbce0.apk.gz a variant of Android/AdDisplay.Waps.G potentially unwanted application deleted - quarantined
F:\old data drive\SD Card Backups\11-9-2011\TitaniumBackup\com.alienmanfc6.wheresmyandroid-d13c3006d126b1f813fc0681747e536a.apk.gz a variant of Android/Monitor.Walien.G potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\11-9-2011\TitaniumBackup\com.herocraft.game.montezuma2-f8dd5dc2282f27ddd504dd2aff875060.apk.gz a variant of Android/SMSKey.Q potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\11-9-2011\TitaniumBackup\com.herocraft.game.yumsters-6c341295fdce1b56760a2fa00d5ab0cd.apk.gz a variant of Android/SMSKey.Q potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\11-9-2011\TitaniumBackup\de.trier.infsec.koch.droidsheep-9722fdd6b1da8151635b992931fbd66a.apk.gz Android/HackTool.DroidSheep.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\11-9-2011\TitaniumBackup\org.yaaic-d076010bd3ce316be9a34cd3d79cfc99.apk.gz a variant of Android/Pircob.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\2012-05-01.17.17.36_IceColdSandwich7.4.AOKPte\data.ext4.tar a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\clockworkmod\backup\2012-02-24.15.42.13_BlackICE.v1.28b9\data.ext4.tar a variant of Android/AdDisplay.Waps.G potentially unwanted application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\com.dexetra.iris-3567ec0da7e3ed541ea00eefe51266fb.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\com.forshared-7d8c85cbcf648a7e504e4315a7ad38cc.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\com.heytell-f9ccc11ffd5e0d09f8f452c89cab7944.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\com.omgpop.dstfree-99ca2ff57a6556f3a678c5a0f9f5a39b.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\com.zeptolab.ctr.paid-8c5496d34dd5a655f90ae3c6a0af225d.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\com.zynga.words-f21ee0c89f62700efb49c6314e321ab7.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\mobiarrow-10x10.png.mgeek.TunnyBrowser-b32e904a89df7510548bb253d28cbce0.apk.gz a variant of Android/AdDisplay.Waps.G potentially unwanted application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\mobiarrow-10x10.png.SyndicateApps.ICSv2-95bd94eb594665061ed6d755118e9396.apk.gz Android/Plankton.H trojanarrow-10x10.png deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\net.zedge.android-1ead321e5bb8873d6ff100ebf2734d97.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\5-1-2012\TitaniumBackup\org.yaaic-d076010bd3ce316be9a34cd3d79cfc99.apk.gz a variant of Android/Pircob.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\com.dexetra.iris-3567ec0da7e3ed541ea00eefe51266fb.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\com.forshared-d529238c7dfca140dd1232681081b875.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\com.heytell-f9ccc11ffd5e0d09f8f452c89cab7944.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\com.omgpop.dstfree-99ca2ff57a6556f3a678c5a0f9f5a39b.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\com.zeptolab.ctr.paid-8c5496d34dd5a655f90ae3c6a0af225d.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\com.zynga.words-78997d0ec9307a07568426a47719aeb3.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\mobi.mgeek.TunnyBrowser-b32e904a89df7510548bb253d28cbce0.apk.gz a variant of Android/AdDisplay.Waps.G potentially unwanted application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\mobi.SyndicateApps.ICSv2-95bd94eb594665061ed6d755118e9396.apk.gz Android/Plankton.H trojan deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\net.zedge.android-1ead321e5bb8873d6ff100ebf2734d97.apk.gz a variant of Android/Inmobi.A potentially unsafe application deleted - quarantined
F:\old data drive\SD Card Backups\6-3-2012\TitaniumBackup\org.yaaic-d076010bd3ce316be9a34cd3d79cfc99.apk.gz a variant of Android/Pircob.A potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\10-20 presdcardpatch\TitaniumBackup\com.alienmanfc6.wheresmyandroid-d13c3006d126b1f813fc0681747e536a.apk.gz a variant of Android/Monitor.Walien.G potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\10-20 presdcardpatch\TitaniumBackup\com.herocraft.game.montezuma2-f8dd5dc2282f27ddd504dd2aff875060.apk.gz a variant of Android/SMSKey.Q potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\10-20 presdcardpatch\TitaniumBackup\com.herocraft.game.yumsters-6c341295fdce1b56760a2fa00d5ab0cd.apk.gz a variant of Android/SMSKey.Q potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\10-20 presdcardpatch\TitaniumBackup\de.trier.infsec.koch.droidsheep-9722fdd6b1da8151635b992931fbd66a.apk.gz Android/HackTool.DroidSheep.A potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\10-20 presdcardpatch\TitaniumBackup\org.yaaic-d076010bd3ce316be9a34cd3d79cfc99.apk.gz a variant of Android/Pircob.A potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\ace-hack-kit-v11\tools\dngrd\psneuter Android/Exploit.PSN.A trojan cleaned by deleting - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\clockworkmod\backup\ninja8171-oct3\data.ext3.tar Android/HackTool.DroidSheep.A potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\clockworkmod\backup\Sep-19-2011-ninja\data.ext3.tar a variant of Android/SMSKey.Q potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\downloadarrow-10x10.png\droidsheep-current.apk Android/HackTool.DroidSheep.A potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\TitaniumBackup\com.alienmanfc6.wheresmyandroid-d13c3006d126b1f813fc0681747e536a.apk.gz a variant of Android/Monitor.Walien.G potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\TitaniumBackup\com.herocraft.game.montezuma2-f8dd5dc2282f27ddd504dd2aff875060.apk.gz a variant of Android/SMSKey.Q potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\TitaniumBackup\com.herocraft.game.yumsters-6c341295fdce1b56760a2fa00d5ab0cd.apk.gz a variant of Android/SMSKey.Q potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\TitaniumBackup\de.trier.infsec.koch.droidsheep-9722fdd6b1da8151635b992931fbd66a.apk.gz Android/HackTool.DroidSheep.A potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\android sdcard backup 10-13-11\TitaniumBackup\org.yaaic-d076010bd3ce316be9a34cd3d79cfc99.apk.gz a variant of Android/Pircob.A potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\nandroid_titanium\TitaniumBackup\com.alienmanfc6.wheresmyandroid-d13c3006d126b1f813fc0681747e536a.apk.gz a variant of Android/Monitor.Walien.G potentially unsafe application deleted - quarantined
F:\old data drive\SyncBack Backup\Desktop\sdcard backup 5-25\TitaniumBackup\joansoft.dailybible-0f70e4365ccc39242223b494f8f471ed.apk.gz a variant of Android/AdDisplay.AirPush.C potentially unwanted application deleted - quarantined
 


#9 buddy215

buddy215

  • Moderator
  • 13,262 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:20 AM

Posted 02 February 2015 - 06:37 AM

Your Android device is infected. Downloading from any place other than the Google Play site guarantees your device will be infected. You have

malware on that device that is stealing whatever info is on it.

 

You may have missed this:

rerun AdwCleaner and post the results.

Reset Google Chrome

 

Google Chrome gives you the option to reset your browser settings in one easy click. In some cases, programs that you install can change your Chrome settings without your knowledge. You may see additional extensions and toolbars or a different search engine. Resetting your browser settings will reset the unwanted changes caused by installing other programs. However, your saved bookmarks and passwords will not be cleared or changed.

Reset your browser settings

  1. In the top-right corner of the browser window, click the Chrome menu
  2. Select Settings.
  3. At the bottom, click Show advanced settings.
  4. Under the section "Reset settings,” click Reset settings.
  5. In the dialog that appears, click Reset.

There is something on your computer that is a bit unusual. You may have noticed that certain words are being changed to links back to your posts.

The tools and expertise needed to use them to find the culprit necessitates your posting a new topic in the Malware Removal Forum after creating a DDS log.

 

See Instruction #6 for directions on how to create a DDS log here: Preparation Guide For Use Before Using Malware Removal Tools and Requesting Help

Post the new Topic here: Virus, Trojan, Spyware, and Malware Removal Logs Forum - BleepingComputer.com

Once you have posted the new topic, DO NOT bump it. Wait for a reply.


Edited by buddy215, 02 February 2015 - 06:39 AM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#10 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 04 February 2015 - 03:01 PM

Sorry, I was away for work but I'm back now, ill complete the rest of the steps



#11 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 04 February 2015 - 03:12 PM

# AdwCleaner v4.109 - Report created 04/02/2015 at 13:07:39
# Updated 24/01/2015 by Xplode
# Database : 2015-02-04.1 [Live]
# Operating System : Windows 7 Ultimate Service Pack 1 (64 bits)
# Username : Colton - COLTON-PC
# Running from : C:\Users\Colton\Desktop\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
 
***** [ Scheduled Tasks ] *****
 
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v11.0.9600.17496
 
 
-\\ Google Chrome v39.0.2171.99
 
[C:\Users\Colton\AppData\Local\Google\Chrome\User Data\Default\preferences] - Deleted [Startup_URLs] : hxxp://websearch.thesearchpage.info/?pid=20495&r=2015/01/16&hid=2003297146304647893&lg=EN&cc=US&unqvl=74
 
*************************
 
AdwCleaner[R0].txt - [4562 octets] - [01/02/2015 19:29:05]
AdwCleaner[R1].txt - [1070 octets] - [04/02/2015 13:02:51]
AdwCleaner[S0].txt - [4705 octets] - [01/02/2015 19:32:14]
AdwCleaner[S1].txt - [995 octets] - [04/02/2015 13:07:39]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S1].txt - [1054 octets] ##########


#12 buddy215

buddy215

  • Moderator
  • 13,262 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:20 AM

Posted 04 February 2015 - 03:28 PM

Good. I'm really curious as to what is on that computer creating links in the scan results. Though it didn't happen in the

latest AdwCleaner scan....better to confirm whatever caused that is now gone.


Edited by buddy215, 04 February 2015 - 03:32 PM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#13 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 04 February 2015 - 03:36 PM

Yeah definitely.  I just created the new post in Malware Removal forums.  Thanks for all your help. 



#14 colt45

colt45
  • Topic Starter

  • Members
  • 28 posts
  • OFFLINE
  •  
  • Local time:12:20 AM

Posted 05 February 2015 - 07:29 PM

I think I found the culprit for the links in my replies.  There was a Chrome extension, named Adblocker Helper I believe. After I reset Chrome settings like you said, it turned off all the extensions and I noticed the ads were gone.  I deleted the extension and no problem since. I'm gonna uninstall Chrome and start new because it still won't update because of group policy settings so I have to change that.  


Edited by colt45, 05 February 2015 - 07:30 PM.


#15 buddy215

buddy215

  • Moderator
  • 13,262 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:02:20 AM

Posted 05 February 2015 - 10:14 PM

That group policy will be fixed when your other topic is reviewed. I see that problem often and the pros will fix it for you.

So, don't abandon the other topic....

 

A ad blocker that works great...I've used for years...is Adblock Plus. Be sure to get it at the Google site to avoid getting more adware

by downloading from any of the download sites. Adblock Plus - Chrome Web Store


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users