Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Browser Hijacker/Redirector


  • Please log in to reply
8 replies to this topic

#1 Cpiatt

Cpiatt

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:20 AM

Posted 31 August 2015 - 07:46 AM

Hi -

 

I am having a very difficult time with my HP laptop.  Not sure what exactly happened but I downloaded or used something infected in the last few days and my laptop has been a mess with a persistent browser redirector ever since.  I have tried everything I can think of, everything that I seem to find online and everything friends recommend.  I have deleted every program I have installed since before the problem started.  I have downloaded adwcleaner, avast, avira, microsoft safety scanner and microsoft malicious program and all the scans have turned up essentially empty.  I have checked the host notepad file in systems driver and its clean.  I have tried to check the registry for specified files but I couldn't find anything.  I have uninstalled google and mozilla and reinstalled.  I have reset the browsers constantly, but nothing has had any effect.  The only thing that has helped a bit is an adware blocker, which doesnt fix the problem, just allows me to use the computer without it being hijacked constantly.

 

The malware redirects me to a few different sites.  http://ecpmrocks.com/ is one of them, ilivid is another.  cdnone is a site that pops up in the bottom left corner frequently while its redirecting, as does trusted -offer provider.com and something like adswer162.  

 

Please help me, and let me know if you need any more information - I am a teacher and need my computer constantly.  Thanking you profusely in advance.

 

-C



BC AdBot (Login to Remove)

 


#2 Cpiatt

Cpiatt
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:20 AM

Posted 31 August 2015 - 08:11 AM

Didn't read the guidelines before posting - sorry.  Think the only thing I left out was that I am running on windows 8.1.

 

When I run adwcleaner the file that shows up every time is 

 

http_pstatic.bestpriceninja.com in local storage on Chrome

 

 

I clean it and restart but its back each time

 

thank you 



#3 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:20 PM

Posted 02 September 2015 - 02:42 AM

Hello and welcome to BC,

 

Please download Rkill (courtesy of BleepingComputer.com) to your desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe
http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/
 

§  Double-click on the Rkill desktop icon to run the tool.

§  If using Windows Vista, 7 or 8 right-click on it and choose Run As Administrator.

§  black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.

§  If not, delete the file, then download and use the one provided in Link 2.

§  Do not reboot until instructed.

§  If the tool does not run from any of the links provided, please let me know.

If normal mode still doesn't work, run the tool from safe mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

-------

 

Kaspersky Virus Removal Tool

Please download Kaspersky Virus Removal Tool from here.

§  Right click on KVRT.exe and select Run as Administrator.

§  Read the EULA, then select Accept.

§  Wait for Kaspersky Virus Removal Tool to initialize.

§  In the main screen, select Change parameters, place a checkmark in System drive, then click OK.

§  Click Start scan.

§  Wait for Kaspersky Virus Removal Tool to complete scanning.

§  When the scan is finished, select Neutralize all for all detected objects.

§  Close Kaspersky Virus Removal Tool when done.

Informe me if something is detected.

--------------

 

Please download Malwarebytes Anti-Malware (MBAM) to your desktop.

NOTE. If you already have MBAM 2.0 installed scroll down.

 

§  Double-click mbam-setup-2.x.x.xxxx.exe and follow the prompts to install the program.

§  At the end, be sure a checkmark is placed next to the following:
 

o    Launch Malwarebytes Anti-Malware

o    A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.

 

§  Click Finish.

§  On the Dashboard, click the 'Update Now >>' link

§  After the update completes, on Settings tab, set under Detection and Protection next options: 

1. 'Scan for rootkits'

2. Non-Malware Protection, for 'PUP detections', check, 'Threat detections as malware' option.

§  Return to Dashboard, click the 'Scan Now >>' button.

§  A Threat Scan will begin.

§  When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

§  In most cases, a restart will be required.

§  Wait for the prompt to restart the computer to appear, than click on Yes.


If you already have MBAM 2.0 installed:
 

§  On the Dashboard, click the 'Update Now >>' link.

§  After the update completes, on Settings tab, set under Detection and Protection next options: 

1. 'Scan for rootkits'

2. Non-Malware Protection, for 'PUP detections', check, 'Threat detections as malware' option.

§  Return to Dashboard, click the Scan Now >> button.

§  A Threat Scan will begin.

§  When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

§  In most cases, a restart will be required.

§  Wait for the prompt to restart the computer to appear, than click on Yes.

§  After the restart once you are back at your desktop, open MBAM once more.

§  Click on the History tab > Application Logs.

§  Double click on the Scan Log which shows the Date and time of the scan just performed.

§  Click 'Export'.

§  Click 'Copy to Clipboard'

§  Paste the contents of the clipboard into your reply.

---------------

 

Please download AdwCleaner by Xplode onto your desktop.

§  Close all open programs and internet browsers.

§  Double click on adwcleaner.exe to run the tool.

§  In EULA window click I agree.

§  In Options uncheck Reset Winsock settings.

§  Click on Scan button.

§  When the scan has finished click on Cleaning button.

§  Your computer will be rebooted automatically. A text file will open after the restart.

§  Please post the contents of that logfile with your next reply.

§  You can find the logfile at C:\AdwCleaner[C1].txt as well.

------------

 

Please download Junkware Removal Tool to your desktop.

§  Shut down your protection software now to avoid potential conflicts.

§  Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".

§  The tool will open and start scanning your system.

§  Please be patient as this can take a while to complete depending on your system's specifications.

§  On completion, a log (JRT.txt) is saved to your desktop and will automatically open.

§  Post the contents of JRT.txt into your next message.

-------------


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#4 Cpiatt

Cpiatt
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:20 AM

Posted 02 September 2015 - 09:30 PM

Hi - Thank  you so much for taking the time to help me out with this - I really appreciate it.  

Below I have included all the logs from the security and cleaner programs you mentioned.  The only one that I could not access was the last one, the junkware one, the link took me here, http://thisisudax.org/downloads/JRT.exe, which does not seem to be a page that is currently working.  

 

Unfortunately the malware still seems to be on my device - trying to redirect my browser constantly.  Please let me know what I can do next or where I might be able to find a working download for the last program.  Thank you

 

rKill

Rkill 2.8.2 by Lawrence Abrams (Grinler)

http://www.bleepingcomputer.com/

Copyright 2008-2015 BleepingComputer.com

More Information about Rkill can be found at this link:

 http://www.bleepingcomputer.com/forums/topic308364.html

 

Program started at: 09/03/2015 07:59:17 AM in x64 mode.

Windows Version: Windows 8.1

 

Checking for Windows services to stop:

 

 * No malware services found to stop.

 

Checking for processes to terminate:

 

 * No malware processes found to kill.

 

Checking Registry for malware related settings:

 

 * No issues found in the Registry.

 

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

 

Performing miscellaneous checks:

 

 * Windows Defender Disabled

 

   [HKLM\SOFTWARE\Microsoft\Windows Defender]

   "DisableAntiSpyware" = dword:00000001

 

Checking Windows Service Integrity:

 

 * No issues found.

 

Searching for Missing Digital Signatures:

 

 * No issues found.

 

Checking HOSTS File:

 

 * No issues found.

 

Program finished at: 09/03/2015 07:59:30 AM

Execution time: 0 hours(s), 0 minute(s), and 12 seconds(s)

Kaspersky

-          SCAN

-          C:\Users\Currier\AppData\Local\Temp\0ab6b8c2\328065.ftf-not-a-virus:AdWare.MSIL.CloudScout.bi

-          C:\Users\Currier\AppData\Local\Temp\supoptsetup.exe -not-a-virus:RiskTool.Win32.OptimizerPro.e

-          C:\Users\Currier\AppData\Local\Temp\1f5b4c8b\220499.ftf -not-a-virus:AdWare.MSIL.CloudScout.br

-          DISINFECTION

-         

-          C:\Users\Currier\AppData\Local\Temp\0ab6b8c2\328065.ftf –Delete

-          C:\Users\Currier\AppData\Local\Temp\1f5b4c8b\220499.ftf –Delete

-          C:\Users\Currier\AppData\Local\Temp\supoptsetup.exe –Delete

 

 

Malwarebytes Anti-Malware

www.malwarebytes.org

 

Scan Date: 9/2/2015

Scan Time: 10:59 PM

Logfile:

Administrator: Yes

 

Version: 2.1.8.1057

Malware Database: v2015.09.02.06

Rootkit Database: v2015.08.16.01

License: Free

Malware Protection: Disabled

Malicious Website Protection: Disabled

Self-protection: Disabled

 

OS: Windows 8.1

CPU: x64

File System: NTFS

User: Currier

 

Scan Type: Threat Scan

Result: Completed

Objects Scanned: 368263

Time Elapsed: 48 min, 36 sec

 

Memory: Enabled

Startup: Enabled

Filesystem: Enabled

Archives: Enabled

Rootkits: Enabled

Heuristics: Enabled

PUP: Enabled

PUM: Enabled

 

Processes: 0

(No malicious items detected)

 

Modules: 0

(No malicious items detected)

 

Registry Keys: 3

PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\POLICIES\GOOGLE\UPDATE, Quarantined, [c35b919a8b002d09e4e7e589bb496f91],

PUP.Optional.MultiPlug, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL\{1146AC44-2F03-4431-B4FD-889BC837521F}{cae99edb}, Quarantined, [55c99398008bad89e467f3ad699be818],

PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\WOW6432NODE\POLICIES\GOOGLE\UPDATE, Quarantined, [09151d0e2863b680f4d79fcffd07a15f],

 

Registry Values: 2

PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\POLICIES\GOOGLE\UPDATE|DisableAutoUpdateChecksCheckboxValue, 1, Quarantined, [c35b919a8b002d09e4e7e589bb496f91]

PUM.Security.Hijack.DisableChromeUpdates, HKLM\SOFTWARE\WOW6432NODE\POLICIES\GOOGLE\UPDATE|DisableAutoUpdateChecksCheckboxValue, 1, Quarantined, [09151d0e2863b680f4d79fcffd07a15f]

 

Registry Data: 2

Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{26C5DD7E-DA86-4467-885A-D903F68EB4C3}|NameServer, 82.163.143.172,82.163.142.174, Good: (), Bad: (82.163.143.172,82.163.142.174),Replaced,[b965f13a8209270f170080e3f90c2dd3]

Trojan.DNSChanger, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\TCPIP\PARAMETERS\Interfaces\{B52CD5D0-69F9-4F84-8F60-371A2575B7F2}|NameServer, 82.163.143.172,82.163.142.174, Good: (), Bad: (82.163.143.172,82.163.142.174),Replaced,[60be38f3008bd95dee294f14d3320000]

 

Folders: 3

PUP.Optional.PullUpdate.Gen, C:\ProgramData\Nauvleanmo\1.0.4.1, Quarantined, [ff1fdd4e5833f83e751f4030fc08a15f],

PUP.Optional.PullUpdate.Gen, C:\ProgramData\Nauvleanmo, Quarantined, [ff1fdd4e5833f83e751f4030fc08a15f],

PUP.Optional.CouponAlert, C:\CouponAlert, Quarantined, [3fdf64c746456bcb756e2ecf9d656898],

 

Files: 6

PUP.Optional.Spigot, C:\Users\Currier\AppData\Local\Temp\~spEB7.tmp, Quarantined, [fd21aa810388ab8bb9347a191ce9b24e],

PUP.Optional.Spigot, C:\Users\Currier\AppData\Local\Temp\nso1E56.tmp\SM.dll, Quarantined, [9886eb40ccbf8babbe2f682b2fd60ff1],

PUP.Optional.PullUpdate.Gen, C:\ProgramData\Nauvleanmo\1.0.4.1\tiarprad.exe.config, Quarantined, [ff1fdd4e5833f83e751f4030fc08a15f],

PUP.Optional.PullUpdate.Gen, C:\ProgramData\Nauvleanmo\1.0.4.1\sqlite3.dll, Quarantined, [ff1fdd4e5833f83e751f4030fc08a15f],

PUP.Optional.PullUpdate.Gen, C:\ProgramData\Nauvleanmo\dat.dat, Quarantined, [ff1fdd4e5833f83e751f4030fc08a15f],

PUP.Optional.Spigot, C:\Users\Currier\AppData\Roaming\Mozilla\Firefox\Profiles\k1o3d55c.default\prefs.js, Good: (), Bad: (user_pref("keyword.URL", "https://search.yahoo.com/search?fr=greentree_ff1&ei=utf-8&ilc=12&type=635779&p=");), Replaced,[e5392ffcbbd010268c27a3f5b74ef60a]

 

Physical Sectors: 0

(No malicious items detected)

 

 

(end)

 

ADWCLEANER

# AdwCleaner v5.004 - Logfile created 03/09/2015 at 09:10:50

# Updated 26/08/2015 by Xplode

# Database : 2015-08-20.1 [Local]

# Operating system : Windows 8.1  (x64)

# Username : Currier - CPSLAPTOP

# Running from : C:\Users\Currier\Downloads\adwcleaner_5.004.exe

# Option : Cleaning

# Support : http://toolslib.net/forum

***** [ Services ] *****

 

***** [ Folders ] ****

 

***** [ Files ] *****

 

[-] File Deleted : C:\Users\Currier\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_pstatic.bestpriceninja.com_0.localstorage

[-] File Deleted : C:\Users\Currier\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_pstatic.bestpriceninja.com_0.localstorage-journal

[-] File Deleted : C:\Users\Currier\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_pstatic.bestpriceninja.com_0.localstorage

[-] File Deleted : C:\Users\Currier\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxps_pstatic.bestpriceninja.com_0.localstorage-journal

***** [ Shortcuts ] *****

***** [ Scheduled tasks ] *****

***** [ Registry ] *****

***** [ Web browsers ] *****

*************************

########## EOF - C:\AdwCleaner\AdwCleaner[C5].txt - [1173 bytes] ##########



#5 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:20 PM

Posted 03 September 2015 - 02:57 AM

Nice.

 

Run JRT and tell me the state of your problem?


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#6 Cpiatt

Cpiatt
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:20 AM

Posted 04 September 2015 - 05:11 AM

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 7.6.0 (08.31.2015:1)
OS: Windows 8.1 x64
Ran by Currier on Fri 09/04/2015 at 16:40:59.84
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Tasks
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\SearchScopes\{16D04E93-D0B2-4DA8-A9FC-DDF66D6AF7DE}
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] C:\ProgramData\lavasoft\web companion
 
 
 
~~~ Chrome
 
 
[C:\Users\Currier\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - default search provider reset
 
[C:\Users\Currier\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - Extensions Deleted:
 
[C:\Users\Currier\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - default search provider reset
 
[C:\Users\Currier\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - Extensions Deleted:
[]
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Fri 09/04/2015 at 16:46:46.12
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  
 
Wow - that last one seems to have done it - no pop ups or redirects.
 
That is amazing thanks so much.
 
Should it be okay to go back through and delete all the remover and security software?
 
Thanks again, you are a legend.


#7 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:20 PM

Posted 04 September 2015 - 09:29 AM

 

Should it be okay to go back through and delete all the remover and security software?
 
Thanks again, you are a legend.

 

 

Great.  :thumbup2:

 

Just do this. 

 

Empty your temp folders using TFC (Temporary File Cleaner)

§  Please download TFC by Old Timer and save it to your desktop.
alternate download link

§  Save any unsaved work. (TFC will close ALL open programs including your browser!)

§  Double-click on TFC.exe to run it. (If you are using Vista or above, right-click on the file and choose "Run As Administrator".)

§  Click the Start button to begin the cleaning process and let it run uninterrupted to completion.

§  Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway allowing Windows to load normally (not into Safe Mode) to ensure a complete clean.

--------

 

This step will remove all cleaning tools we used, it'll reset restore points (so you won't get reinfected by accidentally using some older restore point) and it'll make some other minor adjustments...
This is a very crucial step so make sure you don't skip it.
Download  DelFix by Xplode to your desktop. Delfix will delete all the used tools and logfiles.

Double-click Delfix.exe to start the tool.
Make sure the following items are checked:

§  Activate UAC (optional; some users prefer to keep it off)

§  Remove disinfection tools

§  Create registry backup

§  Purge System Restore

§  Reset system settings
Now click "Run" and wait patiently.
Once finished, a logfile will be created. You don't have to attach it to your next reply.


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#8 Cpiatt

Cpiatt
  • Topic Starter

  • Members
  • 5 posts
  • OFFLINE
  •  
  • Local time:02:20 AM

Posted 05 September 2015 - 04:47 AM

Great - did it all and my computer seems to be back to normal.  Thanks again for all your help - total life saver



#9 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:20 PM

Posted 05 September 2015 - 04:49 AM

Great.  :thumbup2:

 

Best regards.


Edited by severac, 05 September 2015 - 04:50 AM.

I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users