Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Spigot Malware apparently installed, browsers suddenly use Yahoo.com


  • Please log in to reply
11 replies to this topic

#1 gblister

gblister

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:01 AM

Posted 12 September 2015 - 10:19 AM

I notcied this after rebooting my computer recently. I suspect the cause might have come from updating a program that I used to download some youtube videos.

 

Other strange things I have noticed: some "malware" program was recently installed, as well as a few other suspicious programs by "Spigot". I have uninstalled them and re-booted, but Yahoo is still my the defauly in both Chrome and Firefox.

 



BC AdBot (Login to Remove)

 


#2 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:01 AM

Posted 12 September 2015 - 10:41 AM

Hello,

 

Let's do a check.

 

Please download Rkill to your Desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe
http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/
 

§  Double-click on the Rkill desktop icon to run the tool.

§  If using Windows Vista, 7, 8 or 10 right-click on it and choose Run As Administrator.

§  black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.

§  If not, delete the file, then download and use the one provided in Link 2.

§  Do not reboot until instructed.

§  If the tool does not run from any of the links provided, please let me know.

If normal mode still doesn't work, run the tool from Safe Mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

-------

 

Please download Malwarebytes Anti-Malware (MBAM) to your desktop.
NOTE. If you already have MBAM 2.0 installed scroll down.

 

§  Double-click mbam-setup-2.x.x.xxxx.exe and follow the prompts to install the program.

§  At the end, be sure a checkmark is placed next to the following:
 

o    Launch Malwarebytes Anti-Malware

o    A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.

 

§  Click Finish.

§  On the Dashboard, click the 'Update Now >>' link

§  After the update completes, on Settings tab, set under Detection and Protection next options: 

1. 'Scan for rootkits'

2. Non-Malware Protection, for 'PUP detections', check, 'Threat detections as malware' option.

§  Return to Dashboard, click the 'Scan Now >>' button.

§  A Threat Scan will begin.

§  When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

§  In most cases, a restart will be required.

§  Wait for the prompt to restart the computer to appear, than click on Yes.


If you already have MBAM 2.0 installed:
 

§  On the Dashboard, click the 'Update Now >>' link.

§  After the update completes, on Settings tab, set under Detection and Protection next options: 

1. 'Scan for rootkits'

2. Non-Malware Protection, for 'PUP detections', check, 'Threat detections as malware' option.

§  Return to Dashboard, click the Scan Now >> button.

§  A Threat Scan will begin.

§  When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

§  In most cases, a restart will be required.

§  Wait for the prompt to restart the computer to appear, than click on Yes.

§  After the restart once you are back at your desktop, open MBAM once more.

§  Click on the History tab > Application Logs.

§  Double click on the Scan Log which shows the Date and time of the scan just performed.

§  Click 'Export'.

§  Click 'Copy to Clipboard'

§  Paste the contents of the clipboard into your reply.

-----

 

Please download AdwCleaner by Xplode onto your desktop.

§  Close all open programs and internet browsers.

§  Double click on adwcleaner.exe to run the tool.

§  In EULA window click I agree.

§  In Options uncheck Reset Winsock settings.

§  Click on Scan button.

§  When the scan has finished click on Cleaning button.

§  Your computer will be rebooted automatically. A text file will open after the restart.

§  Please post the contents of that logfile with your next reply.

§  You can find the logfile at C:\AdwCleaner[C1].txt as well.

--------

 

Please download Junkware Removal Tool  to your desktop.

§  Shut down your protection software now to avoid potential conflicts.

§  Run the tool by double-clicking it. If you are using Windows Vista, 7, 8 or 10; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".

§  The tool will open and start scanning your system.

§  Please be patient as this can take a while to complete depending on your system's specifications.

§  On completion, a log (JRT.txt) is saved to your desktop and will automatically open.

§  Post the contents of JRT.txt into your next message.

-------


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#3 gblister

gblister
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:01 AM

Posted 12 September 2015 - 11:11 AM

Thank you for the help. Here are the results:

 

RKILL:

 

Rkill 2.8.2 by Lawrence Abrams (Grinler)

http://www.bleepingcomputer.com/

Copyright 2008-2015 BleepingComputer.com

More Information about Rkill can be found at this link:

 http://www.bleepingcomputer.com/forums/topic308364.html

 

Program started at: 09/12/2015 11:47:20 AM in x64 mode.

Windows Version: Windows 7 Home Premium

 

Checking for Windows services to stop:

 

 * No malware services found to stop.

 

Checking for processes to terminate:

 

 * No malware processes found to kill.

 

Checking Registry for malware related settings:

 

 * No issues found in the Registry.

 

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

 

Performing miscellaneous checks:

 

 * No issues found.

 

Checking Windows Service Integrity:

 

 * No issues found.

 

Searching for Missing Digital Signatures:

 

 * No issues found.

 

Checking HOSTS File:

 

 * HOSTS file entries found:

 

  127.0.0.1       localhost

 

Program finished at: 09/12/2015 11:47:27 AM

Execution time: 0 hours(s), 0 minute(s), and 7 seconds(s)

 

MBAM:

 

Malwarebytes Anti-Malware

www.malwarebytes.org

 

Scan Date: 13/09/2014

Scan Time: 12:07 PM

Logfile:

Administrator: Yes

 

Version: 2.00.2.1012

Malware Database: v2014.09.13.03

Rootkit Database: v2014.09.12.01

License: Trial

Malware Protection: Enabled

Malicious Website Protection: Enabled

Self-protection: Disabled

 

OS: Windows 7

CPU: x64

File System: NTFS

User: Me

 

Scan Type: Threat Scan

Result: Completed

Objects Scanned: 346601

Time Elapsed: 3 min, 13 sec

 

Memory: Enabled

Startup: Enabled

Filesystem: Enabled

Archives: Enabled

Rootkits: Disabled

Heuristics: Enabled

PUP: Warn

PUM: Enabled

 

Processes: 0

(No malicious items detected)

 

Modules: 0

(No malicious items detected)

 

Registry Keys: 4

PUP.Optional.Wajam.A, HKLM\SOFTWARE\CLASSES\APPID\{D616A4A2-7B38-4DBC-9093-6FE7A4A21B17}, No Action By User, [3fe8c924ea91ff375330e2db07fbe917],

PUP.Optional.Wajam.A, HKLM\SOFTWARE\WOW6432NODE\CLASSES\APPID\{D616A4A2-7B38-4DBC-9093-6FE7A4A21B17}, No Action By User, [3fe8c924ea91ff375330e2db07fbe917],

PUP.Optional.PricePeep.A, HKU\S-1-5-21-2694955766-1192263862-1908157170-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{FD6D90C0-E6EE-4BC6-B9F7-9ED319698007}, No Action By User, [06210edfbcbfaa8cc1388833d72b6898],

PUP.Optional.PricePeep.A, HKU\S-1-5-21-2694955766-1192263862-1908157170-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{FD6D90C0-E6EE-4BC6-B9F7-9ED319698007}, No Action By User, [06210edfbcbfaa8cc1388833d72b6898],

 

Registry Values: 0

(No malicious items detected)

 

Registry Data: 1

PUP.Optional.Conduit, HKU\S-1-5-21-2694955766-1192263862-1908157170-1000-{ED1FC765-E35E-4C3D-BF15-2C2B11260CE4}-0\SOFTWARE\MICROSOFT\INTERNET EXPLORER\MAIN|Start Page, http://search.conduit.com?SearchSource=10&CUI=UN67363111923172195&ctid=CT3279141, Good: (www.google.com), Bad: (http://search.conduit.com?SearchSource=10&CUI=UN67363111923172195&ctid=CT3279141),No Action By User,[d05715d80f6c5ed8cbef83782ada10f0]

 

Folders: 5

PUP.Optional.SoftwareUpdater.A, C:\Users\Me\AppData\Local\SwvUpdater, No Action By User, [e64118d5a3d8f046efe0699f1ee5916f],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\xpi, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\xpi\defaults, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\xpi\defaults\preferences, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

 

Files: 34

PUP.Optional.Koyote.A, C:\downloads\FreeMp3WmaConverterSetup-r0-n-bf.exe, No Action By User, [4bdcb33ad8a348ee7543d57ae918be42],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\nsuC8BF.exe, No Action By User, [55d2509d6f0c1620837ba08df011c13f],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\nsgE8CD.exe, No Action By User, [2afdec0197e4f93ded11cc610af73fc1],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\nskA03.exe, No Action By User, [141385688cef77bfb54989a4e61b37c9],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\nskE9B.exe, No Action By User, [b0778964daa1ca6cf20c5fce21e037c9],

PUP.Optional.Wajam.A, C:\Users\Me\AppData\Local\Temp\wajam_install.exe, No Action By User, [b275b8359cdf40f6d45830178a76e41c],

PUP.Optional.PricePeep.A, C:\Users\Me\AppData\Local\Temp\pricepeep_1.exe, No Action By User, [3dea0ce16912aa8cb0f3e36a02ffaa56],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\SPStub.exe, No Action By User, [2ff8737a8bf094a21e1cd3590df446ba],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\nsaE5D7.exe, No Action By User, [111618d549324ee8f40a64c954ad14ec],

PUP.Optional.Somoto.A, C:\Users\Me\AppData\Local\Temp\nseB0FE.tmp, No Action By User, [53d4539a304b082ed6ae44e3758c7987],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\ctbe.exe, No Action By User, [8a9d14d9de9d10267c94f02fe0203ec2],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\ffLogic.exe, No Action By User, [6abd9657f78461d553e7fe2eab5660a0],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\ieLogic.exe, No Action By User, [28ff38b5641767cf7dbdfa32eb160df3],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\spff.exe, No Action By User, [c166539ad6a5cc6a18226ac2728f718f],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\statisticsStub.exe, No Action By User, [35f201ec304be254fbc559bd917029d7],

PUP.Optional.iBryte, C:\Users\Me\Downloads\Express_Installer (1).exe, No Action By User, [5acdd419d3a838feb3878f9941c0ee12],

PUP.Optional.SoftwareUpdater.A, C:\Users\Me\AppData\Local\SwvUpdater\Updater.xml, No Action By User, [e64118d5a3d8f046efe0699f1ee5916f],

PUP.Optional.SoftwareUpdater.A, C:\Users\Me\AppData\Local\SwvUpdater\status.cfg, No Action By User, [e64118d5a3d8f046efe0699f1ee5916f],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\searchplugins\conduit.xml, No Action By User, [1f08c6272f4c22145d8a28fd32d1c33d],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\chromeid.txt, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\conduit.xml, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\CT3279141.xpi, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\setup.ini.txt, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\version.txt, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\xpi\install.rdf, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Local\Temp\ct3279141\xpi\defaults\preferences\defaults.js, No Action By User, [4bdcaf3e9be0a29424612aa618ea25db],

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js, Good: (), Bad: (user_pref("keyword.URL", "http://search.conduit.com/ResultsExt.aspx?ctid=CT3279141&SearchSource=2&CUI=UN70190375275072065&UM=UM_ID&q=");), No Action By User,[1f0801ec9cdfc373d89ac768d72ea957]

PUP.Optional.Conduit.A, C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js, Good: (), Bad: (user_pref("browser.search.defaulturl", "http://search.conduit.com/ResultsExt.aspx?ctid=CT3279141&SearchSource=3&q={searchTerms}&CUI=UN70190375275072065");), No Action By User,[ba6d6786215ab6802f56f03f18ed60a0]

Trojan.FakeMS.ED, C:\ProgramData\Windows Genuine Advantage\{0A513C9A-C4DF-4432-B0F4-75EF39BA4EAD}\api-ms-win-system-secproc-l1-1-0.dll, Quarantined, [2dfa4ca15c1f64d20d9503baad54629e],

Spyware.Zbot.VXGen, C:\ProgramData\Windows Genuine Advantage\{790CE65E-29E0-4763-B673-9BB7939F4E8F}\msiexec.exe, Quarantined, [9e8919d4ea91df57a29d0eaa5ba616ea],

Trojan.MSIL.ED, C:\Users\Me\AppData\Local\Temp\xvkum.dll, Quarantined, [1a0d6a83b8c32f077728b2a06d93de22],

Trojan.Agent, C:\Users\Me\AppData\Local\Temp\loop.exe, Quarantined, [df484aa3e992fe38e076d7321ce613ed],

Trojan.Agent.RvGen, C:\Windows\Tasks\Security Center Update - 2359659343.job, Quarantined, [d25587663b4074c2cf2f85adc1438878],

Trojan.Agent.RvGen, C:\Windows\Tasks\Security Center Update - 3939743151.job, Quarantined, [de4985685724092d8a746dc5cc389d63],

 

Physical Sectors: 0

(No malicious items detected)

 

 

(end)

 

 

# AdwCleaner v5.007 - Logfile created 12/09/2015 at 12:03:30
# Updated 08/09/2015 by Xplode
# Database : 2015-09-10.1 [Server]
# Operating system : Windows 7 Home Premium  (x64)
# Username : Me - ME-PC
# Running from : C:\downloads\AdwCleaner.exe
# Option : Cleaning
# Support : http://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****

[#] Folder Deleted : C:\ProgramData\{93E26451-CD9A-43A5-A2FA-C42392EA4001}
[#] Folder Deleted : C:\ProgramData\{95B4F0ED-951F-4D36-B068-5EC1C4C19C14}
[#] Folder Deleted : C:\ProgramData\{DB6760C6-7E31-4258-8B1E-523E22F98B9B}
[#] Folder Deleted : C:\Users\Me\AppData\Local\Conduit
[#] Folder Deleted : C:\Users\Me\AppData\Local\MalwareProtectionLive
[#] Folder Deleted : C:\Users\Me\AppData\LocalLow\Conduit
[#] Folder Deleted : C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\Extensions\{c2fc3c2b-a65a-453c-bf95-101fde56ed1d}
[#] Folder Deleted : C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\Extensions\{d3b9472c-f8b1-4a10-935b-1087bac8417f}
[#] Folder Deleted : C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\Extensions\{c2fc3c2b-a65a-453c-bf95-101fde56ed1d}
[#] Folder Deleted : C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\Extensions\{2bc72c53-9bde-4db2-8479-eda9a5e71f4e}
[#] Folder Deleted : C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\Extensions\{c2fc3c2b-a65a-453c-bf95-101fde56ed1d}
[#] Folder Deleted : C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\Extensions\{d3b9472c-f8b1-4a10-935b-1087bac8417f}

***** [ Files ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****


***** [ Registry ] *****

[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{9EDC0C90-2B5B-4512-953E-35767BAD5C67}
[-] Key Deleted : HKCU\Software\APN PIP
[-] Key Deleted : HKCU\Software\AVG Nation toolbar
[-] Key Deleted : HKLM\SOFTWARE\AVG Nation toolbar
[-] Key Deleted : HKLM\SOFTWARE\AVG Security Toolbar
[-] Key Deleted : HKLM\SOFTWARE\Conduit
[-] Key Deleted : HKLM\SOFTWARE\PIP
[!] Key Not Deleted : [x64] HKCU\Software\APN PIP
[!] Key Not Deleted : [x64] HKCU\Software\AVG Nation toolbar

***** [ Web browsers ] *****

[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("CT3279141_Firefox.csv", "[{\"from\":\"Abs Layer\",\"action\":\"loading toolbar\",\"time\":1361644748192,\"isWithState\":\"\",\"timeFromStart\":0,\"timeFromPrev\":0}]");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("Smartbar.ConduitHomepagesList", "hxxp://search.conduit.com/?ctid=CT3279141&SearchSource=13&CUI=UN70190375275072065");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("Smartbar.ConduitSearchEngineList", "WhiteSmoke B Customized Web Search");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("Smartbar.ConduitSearchUrlList", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT3279141&SearchSource=2&CUI=UN70190375275072065&UM=UM_ID&q=");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("Smartbar.SearchFromAddressBarSavedUrl", "");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("Smartbar.keywordURLSelectedCTID", "CT3279141");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("browser.search.defaultthis.engineName", "WhiteSmoke B Customized Web Search");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("browser.search.defaulturl", "hxxp://search.conduit.com/ResultsExt.aspx?ctid=CT3279141&SearchSource=3&q={searchTerms}&CUI=UN70190375275072065");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("browser.startup.homepage", "hxxps://ca.search.yahoo.com/?type=715483&fr=spigot-yhp-ffabout:home");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("smartBar.searchInNewTabOwner", "CT3279141");
[-] [C:\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\prefs.js] [Preference] Deleted : user_pref("startpage.ntsearch_url", "hxxps://search.yahoo.com/search?fr=spigot-nt-ff&ei=utf-8&ilc=12&type=715483&p={searchTerms}");
[-] [C:\Users\Me\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : ask.com
[-] [C:\Users\Me\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences] [Extension] Deleted : jpmbfleldcgkldadpdinhjjopdfpjfjp

*************************


########## EOF - C:\AdwCleaner\AdwCleaner[C1].txt - [4956 bytes] ##########
 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 7.6.1 (09.08.2015:1)
OS: Windows 7 Home Premium x64
Ran by Me on 12/09/2015 at 12:05:45.86
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Tasks



~~~ Registry Values



~~~ Registry Keys

Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer



~~~ Files

Successfully deleted: [File] C:\Users\Me\Appdata\Local\google\chrome\user data\default\local storage\chrome-extension_klbibkeccnjlkjkiokjodocebajanakg_0.localstorage
Successfully deleted: [File] C:\Users\Me\Appdata\Local\google\chrome\user data\default\local storage\chrome-extension_klbibkeccnjlkjkiokjodocebajanakg_0.localstorage-journal



~~~ Folders



~~~ FireFox

Emptied folder: C:\Users\Me\AppData\Roaming\mozilla\firefox\profiles\zo4nmrfi.default\minidumps [44 files]



~~~ Chrome

Successfully deleted: [Folder] C:\Users\Me\Appdata\Local\Google\Chrome\User Data\Default\Extensions\klbibkeccnjlkjkiokjodocebajanakg

[C:\Users\Me\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - default search provider reset

[C:\Users\Me\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - Extensions Deleted:
klbibkeccnjlkjkiokjodocebajanakg

[C:\Users\Me\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - default search provider reset

[C:\Users\Me\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - Extensions Deleted:
[
  klbibkeccnjlkjkiokjodocebajanakg
]





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on 12/09/2015 at 12:07:39.83
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 



#4 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:01 AM

Posted 12 September 2015 - 11:17 AM

Do you still have problems?

 

I can see that in MBAM you choose not to take action in some cases. You should remove all threats.

 

------

 

Kaspersky Virus Removal Tool

Please download Kaspersky Virus Removal Tool from here.

§  Right click on KVRT.exe and select Run as Administrator.

§  Read the EULA, then select Accept.

§  Wait for Kaspersky Virus Removal Tool to initialize.

§  In the main screen, select Change parameters, place a checkmark in System drive, then click OK.

§  Click Start scan.

§  Wait for Kaspersky Virus Removal Tool to complete scanning.

§  When the scan is finished, select Neutralize all for all detected objects.

§  Close Kaspersky Virus Removal Tool when done.

Informe me if something is detected.

------


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#5 gblister

gblister
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:01 AM

Posted 12 September 2015 - 11:22 AM

I didn't mean not to take actions. Should I run MBAM again and take all actions?

 

Yahoo still seems to be my homepage (https://ca.search.yahoo.com/?type=715483&fr=yo-yhp-ch in particular) and default search engine, but maybe that would go away once I reset it?


Edited by gblister, 12 September 2015 - 11:22 AM.


#6 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:01 AM

Posted 12 September 2015 - 11:25 AM

Yes, run again and remove all threats. 

 

If that doesn't help, reset Chrome and Firefox.

 

To reset your browser settings to default:


Edited by severac, 12 September 2015 - 11:25 AM.

I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#7 gblister

gblister
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:01 AM

Posted 12 September 2015 - 11:39 AM

I rescanned with MBAM and removed everything (I think). Then I reset browser settings and rebooted. Everything seems back to normal now.

 

Should I run Kaspersky?



#8 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:01 AM

Posted 12 September 2015 - 11:45 AM

Yes, because MBAM found some trojan, just to be sure. 


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#9 gblister

gblister
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:01 AM

Posted 12 September 2015 - 12:29 PM

Here are the results:

 

3 objects were detected:

 

C:\AdwCleaner\Quarantine\C\Users\Me\AppData\Roaming\Mozilla\Firefox\Profiles\zo4nmrfi.default\Extensions\{2bc72c53-9bde-4db2-8479-eda9a5e71f4e}\chrome\content\startpage.js.vir

not-a-virus:WebToolbar.JS.Spigot.a

 

 

C:\FRST\Quarantine\C\Users\Me\AppData\Roaming\Obocty\qyzoyfy.exe

HEUR:Trojan.Win32.Generic

 

 

C:\FRST\Quarantine\C\Users\Me\AppData\Local\Focusrite\Iljisgwwhj.dll

UDS:DangerousObject.Multi.Generic

 

I neutralized them all.



#10 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:01 AM

Posted 12 September 2015 - 01:14 PM

OK. 

 

If you don't have any problems, we are ready to finalise. 

 

Empty your temp folders using TFC (Temporary File Cleaner)

§  Please download TFC by Old Timer and save it to your desktop.
alternate download link

§  Save any unsaved work. (TFC will close ALL open programs including your browser!)

§  Double-click on TFC.exe to run it. (If you are using Vista or above, right-click on the file and choose "Run As Administrator".)

§  Click the Start button to begin the cleaning process and let it run uninterrupted to completion.

§  Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway allowing Windows to load normally (not into Safe Mode) to ensure a complete clean.

-----------

 

This step will remove all cleaning tools we used, it'll reset restore points (so you won't get reinfected by accidentally using some older restore point) and it'll make some other minor adjustments...
This is a very crucial step so make sure you don't skip it.
Download  DelFix by Xplode to your desktop. Delfix will delete all the used tools and logfiles.

Double-click Delfix.exe to start the tool.
Make sure the following items are checked:

§  Activate UAC (optional; some users prefer to keep it off)

§  Remove disinfection tools

§  Create registry backup

§  Purge System Restore

§  Reset system settings
Now click "Run" and wait patiently.
Once finished, a logfile will be created. You don't have to attach it to your next reply.


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#11 gblister

gblister
  • Topic Starter

  • Members
  • 11 posts
  • OFFLINE
  •  
  • Local time:03:01 AM

Posted 12 September 2015 - 01:57 PM

OK, all done, I hope.

 

Thank you very much.



#12 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:09:01 AM

Posted 12 September 2015 - 01:58 PM

No problem.

 

Best regards.


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users