Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Infected with a rookit


  • Please log in to reply
7 replies to this topic

#1 slikk24

slikk24

  • Members
  • 69 posts
  • OFFLINE
  •  
  • Local time:08:20 PM

Posted 09 October 2015 - 03:08 PM

Anytime I search something it opens up another tab to a different website.  Please help



BC AdBot (Login to Remove)

 


#2 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:04:20 AM

Posted 09 October 2015 - 04:19 PM

Hello,

 

It sounds like adware.

 

Please download Rkill to your Desktop.
There are 2 different versions. If one of them won't run then download and try to run the other one.
You only need to get one of these to run, not all of them. You may get warnings from your antivirus about this tool, ignore them or shutdown your antivirus.

rKill.exe
http://www.bleepingcomputer.com/download/rkill/dl/10/
iExplore.exe (renamed rKill.exe): http://www.bleepingcomputer.com/download/rkill/dl/11/
 

§  Double-click on the Rkill desktop icon to run the tool.

§  If using Windows Vista, 7, 8 or 10 right-click on it and choose Run As Administrator.

§  black DOS box will briefly flash and then disappear. This is normal and indicates the tool ran successfully.

§  If not, delete the file, then download and use the one provided in Link 2.

§  Do not reboot until instructed.

§  If the tool does not run from any of the links provided, please let me know.

If normal mode still doesn't work, run the tool from Safe Mode.

When the scan is done Notepad will open with rKill log.
Post it in your next reply.

NOTE. rKill.txt log will also be present on your desktop.

-------------

 

Please download Malwarebytes Anti-Malware (MBAM) to your desktop.
NOTE. If you already have MBAM 2.0 installed scroll down.

 

§  Double-click mbam-setup-2.x.x.xxxx.exe and follow the prompts to install the program.

§  At the end, be sure a checkmark is placed next to the following:
 

o    Launch Malwarebytes Anti-Malware

o    A 14 day trial of the Premium features is pre-selected. You may deselect this if you wish, and it will not diminish the scanning and removal capabilities of the program.

 

§  Click Finish.

§  On the Dashboard, click the 'Update Now >>' link

§  After the update completes, on Settings tab, set under Detection and Protection next options: 

1. 'Scan for rootkits'

2. Non-Malware Protection, for 'PUP detections', check, 'Threat detections as malware' option.

§  Return to Dashboard, click the 'Scan Now >>' button.

§  A Threat Scan will begin.

§  When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

§  In most cases, a restart will be required.

§  Wait for the prompt to restart the computer to appear, than click on Yes.


If you already have MBAM 2.0 installed:
 

§  On the Dashboard, click the 'Update Now >>' link.

§  After the update completes, on Settings tab, set under Detection and Protection next options: 

1. 'Scan for rootkits'

2. Non-Malware Protection, for 'PUP detections', check, 'Threat detections as malware' option.

§  Return to Dashboard, click the Scan Now >> button.

§  A Threat Scan will begin.

§  When the scan is complete, if there have been detections, click Apply Actions to allow MBAM to clean what was detected.

§  In most cases, a restart will be required.

§  Wait for the prompt to restart the computer to appear, than click on Yes.

§  After the restart once you are back at your desktop, open MBAM once more.

§  Click on the History tab > Application Logs.

§  Double click on the Scan Log which shows the Date and time of the scan just performed.

§  Click 'Export'.

§  Click 'Copy to Clipboard'

§  Paste the contents of the clipboard into your reply.

------------

 

Please download AdwCleaner by Xplode onto your desktop.

§  Close all open programs and internet browsers.

§  Double click on adwcleaner.exe to run the tool.

§  In EULA window click I agree.

§  In Options uncheck Reset Winsock settings.

§  Click on Scan button.

§  When the scan has finished click on Cleaning button.

§  Your computer will be rebooted automatically. A text file will open after the restart.

§  Please post the contents of that logfile with your next reply.

§  You can find the logfile at C:\AdwCleaner[C1].txt as well.

---------------

 

Please download Junkware Removal Tool  to your desktop.

§  Shut down your protection software now to avoid potential conflicts.

§  Run the tool by double-clicking it. If you are using Windows Vista, 7, 8 or 10; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".

§  The tool will open and start scanning your system.

§  Please be patient as this can take a while to complete depending on your system's specifications.

§  On completion, a log (JRT.txt) is saved to your desktop and will automatically open.

§  Post the contents of JRT.txt into your next message.


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#3 slikk24

slikk24
  • Topic Starter

  • Members
  • 69 posts
  • OFFLINE
  •  
  • Local time:08:20 PM

Posted 13 October 2015 - 12:15 PM

Rkill 2.6.3 by Lawrence Abrams (Grinler)
http://www.bleepingcomputer.com/
Copyright 2008-2015 BleepingComputer.com
More Information about Rkill can be found at this link:
http://www.bleepingcomputer.com/forums/topic308364.html

Program started at: 10/13/2015 09:14:36 AM in x64 mode.
Windows Version: Windows 7 Professional

Checking for Windows services to stop:

* No malware services found to stop.

Checking for processes to terminate:

* No malware processes found to kill.

Checking Registry for malware related settings:

* No issues found in the Registry.

Resetting .EXE, .COM, & .BAT associations in the Windows Registry.

Performing miscellaneous checks:

* Windows Defender Disabled

[HKLM\SOFTWARE\Microsoft\Windows Defender]
"DisableAntiSpyware" = dword:00000001

Checking Windows Service Integrity:

* Windows Defender (WinDefend) is not Running.
Startup Type set to: Manual

Searching for Missing Digital Signatures:

* No issues found.

Checking HOSTS File:

* No issues found.

Program finished at: 10/13/2015 09:14:43 AM
Execution time: 0 hours(s), 0 minute(s), and 7 seconds(s)
# AdwCleaner v5.013 - Logfile created 13/10/2015 at 10:14:22
# Updated 09/10/2015 by Xplode
# Database : 2015-10-09.3 [Server]
# Operating system : Windows 7 Professional (x64)
# Username : rbailey - AMWHITE
# Running from : C:\Users\amwhite.CAD\Downloads\AdwCleaner(4).exe
# Option : Cleaning
# Support : http://toolslib.net/forum

***** [ Services ] *****

[-] Service Deleted : Service Mgr StrongSignal
[-] Service Deleted : WinFixRealTimeProtector
[!] Service Not Deleted : Service Mgr StrongSignal
[-] Service Deleted : Update Mgr StrongSignal

***** [ Folders ] *****

[-] Folder Deleted : \rei
[-] Folder Deleted : C:\Program Files\WinFix
[-] Folder Deleted : C:\Program Files (x86)\Bench
[-] Folder Deleted : C:\Program Files (x86)\Viewpoint
[-] Folder Deleted : C:\Program Files (x86)\Strong Signal
[-] Folder Deleted : C:\Program Files (x86)\Superfish
[!] Folder Not Deleted : C:\Program Files (x86)\Strong Signal
[-] Folder Deleted : C:\Program Files (x86)\Common Files\0780f478-67ce-4ec3-98db-39a65f4618ce
[!] Folder Not Deleted : C:\Program Files (x86)\Common Files\0780f478-67ce-4ec3-98db-39a65f4618ce
[!] Folder Not Deleted : C:\Program Files (x86)\Common Files\0780f478-67ce-4ec3-98db-39a65f4618ce
[-] Folder Deleted : C:\ProgramData\Viewpoint
[-] Folder Deleted : C:\ProgramData\WinFix Protector
[-] Folder Deleted : C:\ProgramData\0780f478-67ce-4ec3-98db-39a65f4618ce
[!] Folder Not Deleted : C:\ProgramData\0780f478-67ce-4ec3-98db-39a65f4618ce
[!] Folder Not Deleted : C:\ProgramData\0780f478-67ce-4ec3-98db-39a65f4618ce
[-] Folder Deleted : C:\Users\mbrower\AppData\LocalLow\Superfish

***** [ Files ] *****

[-] File Deleted : C:\Program Files (x86)\Mozilla Firefox\searchplugins\yahoo.xml
[-] File Deleted : C:\Users\Public\Desktop\WinFix Pro.lnk
[-] File Deleted : C:\Windows\Reimage.ini

***** [ DLLs ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****

[-] Task Deleted : bench-sys
[-] Task Deleted : WinFixUpdater
[-] Task Deleted : bench-S-1-5-21-1607477280-1921176570-848803576-1118
[-] Task Deleted : bench-sys
[-] Task Deleted : bench-S-1-5-21-1607477280-1921176570-848803576-1118
[-] Task Deleted : bench-sys

***** [ Registry ] *****

[-] Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl
[-] Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtl.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary
[-] Key Deleted : HKLM\SOFTWARE\Classes\AxMetaStream.MetaStreamCtlSecondary.1
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{03F998B2-0E00-11D3-A498-00104B6EB52E}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
[-] Key Deleted : HKLM\SOFTWARE\MozillaPlugins\@viewpoint.com/VMP
[-] Key Deleted : HKLM\SYSTEM\CurrentControlSet\Services\Eventlog\Application\WajamUpdater
[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\REI_AxControl.DLL
[-] Key Deleted : HKLM\SOFTWARE\Classes\REI_AxControl.ReiEngine.1
[-] Key Deleted : HKLM\SOFTWARE\Classes\REI_AxControl.ReiEngine
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IECT3299872
[-] Key Deleted : HKLM\SOFTWARE\Google\Chrome\Extensions\jpmbfleldcgkldadpdinhjjopdfpjfjp
[-] Key Deleted : HKLM\SOFTWARE\Classes\AppID\{28FF42B8-A0DA-4BE5-9B81-E26DD59B350A}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{03F998B2-0E00-11D3-A498-00104B6EB52E}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{1B00725B-C455-4DE6-BFB6-AD540AD427CD}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{B853E835-9F24-4F4B-B55C-E554D15CCCD2}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{F83D1872-D9FF-47F8-B5A0-49CC51E24EE8}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{E104B9E4-01BA-4AAF-9957-6A525CC5451A}
[-] Key Deleted : HKLM\SOFTWARE\Classes\CLSID\{C723A437-2EAF-466D-A95B-3FA0966BF88C}
[!] Key Not Deleted : HKLM\SOFTWARE\Classes\CLSID\{c723a437-2eaf-466d-a95b-3fa0966bf88c}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}
[-] Key Deleted : HKLM\SOFTWARE\Classes\Interface\{BD51A48E-EB5F-4454-8774-EF962DF64546}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{FA6468D2-FAA4-4951-A53B-2A5CF9CC0A36}
[-] Key Deleted : HKLM\SOFTWARE\Classes\TypeLib\{E806AC01-E7A5-4949-AF7C-7E6E5775035B}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C723A437-2EAF-466D-A95B-3FA0966BF88C}
[!] Key Not Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{c723a437-2eaf-466d-a95b-3fa0966bf88c}
[-] Value Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID [{E4607B39-174A-44BA-AB08-8892366ECA13}]
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{E13BF069-886E-416B-B532-6B14242CC508}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{E4607B39-174A-44BA-AB08-8892366ECA13}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{801B440B-1EE3-49B0-B05D-2AB076D4E8CB}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\CLSID\{E104B9E4-01BA-4AAF-9957-6A525CC5451A}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{431532BD-0AE1-4ABC-BE8C-919F3D1332E2}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{9BB31AD8-5DB2-459E-A901-DEA536F23BA4}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Classes\Interface\{BD51A48E-EB5F-4454-8774-EF962DF64546}
[-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E4607B39-174A-44BA-AB08-8892366ECA13}
[-] Value Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\Toolbar [{E13BF069-886E-416B-B532-6B14242CC508}]
[-] Key Deleted : [x64] HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{49606DC7-976D-4030-A74E-9FB5C842FA68}
[-] Key Deleted : HKCU\Software\InstallCore
[-] Key Deleted : HKLM\SOFTWARE\Bench
[-] Key Deleted : HKLM\SOFTWARE\MetaStream
[-] Key Deleted : HKLM\SOFTWARE\Viewpoint
[-] Key Deleted : HKLM\SOFTWARE\StrongSignal
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ViewpointMediaPlayer
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{cfd32d46-7d3f-483f-bace-7172aec5592d}
[-] Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Strong Signal
[!] Key Not Deleted : [x64] HKCU\Software\InstallCore

***** [ Web browsers ] *****

[-] [C:\Users\rbailey\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : aol.com
[-] [C:\Users\rbailey\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : ask.com

*************************


########## EOF - \AdwCleaner\AdwCleaner[C4].txt - [6620 bytes] ##########
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 7.6.4 (09.28.2015:1)
OS: Windows 7 Professional x64
Ran by rbailey on Tue 10/13/2015 at 10:23:07.77
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




~~~ Services



~~~ Tasks

Successfully deleted: [Task] C:\Windows\system32\tasks\WinFix Pro Reminder 0
Successfully deleted: [Task] C:\Windows\system32\tasks\WinFix Pro Reminder 1
Successfully deleted: [Task] C:\Windows\system32\tasks\WinFix Pro Reminder 2



~~~ Registry Values



~~~ Registry Keys



~~~ Files



~~~ Folders



~~~ Chrome


[C:\Users\rbailey\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - default search provider reset

[C:\Users\rbailey\Appdata\Local\Google\Chrome\User Data\Default\Preferences] - Extensions Deleted:

[C:\Users\rbailey\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - default search provider reset

[C:\Users\rbailey\Appdata\Local\Google\Chrome\User Data\Default\Secure Preferences] - Extensions Deleted:





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Tue 10/13/2015 at 10:26:18.30
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 10/13/2015
Scan Time: 10:29 AM
Logfile:
Administrator: No

Version: 2.1.8.1057
Malware Database: v2015.10.13.06
Rootkit Database: v2015.10.06.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7
CPU: x64
File System: NTFS
User: amwhite

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 532762
Time Elapsed: 58 min, 54 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Warn
PUM: Enabled

Processes: 0
(No malicious items detected)

Modules: 0
(No malicious items detected)

Registry Keys: 6
PUP.Optional.DealSlider, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{E13BF069-886E-416B-B532-6B14242CC508}, Quarantined, [e496d1852d5eaf877a226bbd38cab44c],
PUP.Optional.DealSlider, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{E13BF069-886E-416B-B532-6B14242CC508}, Quarantined, [e496d1852d5eaf877a226bbd38cab44c],
PUP.Optional.DealSlider, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\SETTINGS\{E4607B39-174A-44BA-AB08-8892366ECA13}, Quarantined, [82f86fe77d0eb482f43c42e345bdfb05],
PUP.Optional.DealSlider, HKCU\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\EXT\STATS\{E4607B39-174A-44BA-AB08-8892366ECA13}, Quarantined, [82f86fe77d0eb482f43c42e345bdfb05],
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{8CDE19E6-71C2-4B46-89B7-35F6A18C571A}, Delete-on-Reboot, [5c1ec4924f3cd85e8412f2d4996a8878],
PUP.Optional.DealSlider, HKLM\SOFTWARE\WOW6432NODE\Deal Slider, Delete-on-Reboot, [83f752047d0e241237171b69ca396b95],

Registry Values: 2
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{8CDE19E6-71C2-4B46-89B7-35F6A18C571A}|URL, https://us.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldstr_15_08&param1=1&param2=f%253D4%26bDelete-on-RebootDIE%26ccDelete-on-RebootDus%26paDelete-on-RebootDWinYahoo%26cdDelete-on-RebootD2XzuyEtN2Y1L1QzuyBzztB0B0C0BzyyCyB0ByB0D0B0AyEyBtN0D0Tzu0StCtCyEtAtN1L2XzutAtFyBtFyCtFtCtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2StBzy0AzyyE0FtByEtGyByEzztBtG0F0A0AtCtG0EtDyB0BtGyEtD0B0Azz0CyCzyyDyC0B0E2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0D0F0D0FzyyCyBtGtByB0AzztGyE0EyDyBtGzytA0F0CtGtCtD0AtB0BzytBzz0B0EyCzy2Q%26crDelete-on-RebootD696738836%26aDelete-on-RebootDwny_dnldstr_15_08%26osDelete-on-RebootDWindows 7 Professional&p={searchTerms}, [5c1ec4924f3cd85e8412f2d4996a8878], %5
PUP.Optional.WinYahoo, HKLM\SOFTWARE\MICROSOFT\INTERNET EXPLORER\SEARCHSCOPES\{8CDE19E6-71C2-4B46-89B7-35F6A18C571A}|TopResultURLFallback, https://us.search.yahoo.com/yhs/search?hspart=iry&hsimp=yhs-fullyhosted_003&type=wny_dnldstr_15_08&param1=1&param2=f%253D4%26bDelete-on-RebootDIE%26ccDelete-on-RebootDus%26paDelete-on-RebootDWinYahoo%26cdDelete-on-RebootD2XzuyEtN2Y1L1QzuyBzztB0B0C0BzyyCyB0ByB0D0B0AyEyBtN0D0Tzu0StCtCyEtAtN1L2XzutAtFyBtFyCtFtCtN1L1CzutN1L1G1B1V1N2Y1L1Qzu2StBzy0AzyyE0FtByEtGyByEzztBtG0F0A0AtCtG0EtDyB0BtGyEtD0B0Azz0CyCzyyDyC0B0E2QtN1M1F1B2Z1V1N2Y1L1Qzu2SyD0D0F0D0FzyyCyBtGtByB0AzztGyE0EyDyBtGzytA0F0CtGtCtD0AtB0BzytBzz0B0EyCzy2Q%26crDelete-on-RebootD696738836%26aDelete-on-RebootDwny_dnldstr_15_08%26osDelete-on-RebootDWindows 7 Professional&p={searchTerms}, [a5d53a1c424989adf89e666026ddd828], %5

Registry Data: 0
(No malicious items detected)

Folders: 2
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\databases\http_charmsavings.com_0, Quarantined, [69113b1bafdcb383077b89ea1ae88f71],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\http_charmsavings.com_0.indexeddb.leveldb, Quarantined, [29515df9682367cfd0b3482bb34f7987],

Files: 19
PUP.Optional.Yontoo, C:\Users\amwhite.CAD\AppData\Local\Temp\{091BF4AA-1AE3-4A8F-B476-0E3F6893142B}.dll, Quarantined, [8ded32240586b680ca13c1c525dc01ff],
PUP.Optional.Yontoo, C:\Users\amwhite.CAD\AppData\Local\Temp\{3D716D9F-F8CF-4BED-A96D-419A1D98C0E9}.dll, Quarantined, [97e344129bf090a624b9d0b604fd3dc3],
PUP.Optional.Yontoo, C:\Users\amwhite.CAD\AppData\Local\Temp\{DFCB9862-FCE2-4A7C-89CE-31DD3824F289}.dll, Quarantined, [ef8bff5779120e28c4198ff7bf429868],
PUP.Optional.Yontoo, C:\Users\amwhite.CAD\AppData\Local\Temp\{FB18FFF1-3E3B-47CE-B24A-9E4B201FC6F4}.dll, Quarantined, [4a302036f19a102636a740467190f808],
PUP.Optional.Boost, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.boostsaves.com_0.localstorage, Quarantined, [5d1de76fddae43f3472583f59f6418e8],
PUP.Optional.Boost, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.boostsaves.com_0.localstorage-journal, Quarantined, [b2c8e472b9d28fa73d2f51277192f709],
PUP.Optional.Boost, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.boostsaves.com_0.localstorage, Quarantined, [fe7c4a0c6d1e6dc9cf9e5a1efa097789],
PUP.Optional.Boost, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.boostsaves.com_0.localstorage-journal, Quarantined, [3f3b371f63282a0c80edee8ab64dfe02],
PUP.Optional.PricePeep, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.pricepeep00.pricepeep.net_0.localstorage, Quarantined, [0179b99de0ab0b2bb7446b36f11227d9],
PUP.Optional.PricePeep, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.pricepeep00.pricepeep.net_0.localstorage-journal, Quarantined, [b3c798be26656acc52a9dcc5649fd52b],
PUP.Optional.StrongSignal, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_strongsignal-a.akamaihd.net_0.localstorage, Quarantined, [b5c592c4e9a21b1b4b75cae3d62db050],
PUP.Optional.StrongSignal, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_strongsignal-a.akamaihd.net_0.localstorage-journal, Quarantined, [a7d37bdbf299e254b30d5459d52e6e92],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\databases\http_charmsavings.com_0\2, Quarantined, [69113b1bafdcb383077b89ea1ae88f71],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\http_charmsavings.com_0.indexeddb.leveldb\000003.log, Quarantined, [29515df9682367cfd0b3482bb34f7987],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\http_charmsavings.com_0.indexeddb.leveldb\CURRENT, Quarantined, [29515df9682367cfd0b3482bb34f7987],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\http_charmsavings.com_0.indexeddb.leveldb\LOCK, Quarantined, [29515df9682367cfd0b3482bb34f7987],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\http_charmsavings.com_0.indexeddb.leveldb\LOG, Quarantined, [29515df9682367cfd0b3482bb34f7987],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\http_charmsavings.com_0.indexeddb.leveldb\LOG.old, Quarantined, [29515df9682367cfd0b3482bb34f7987],
PUP.Optional.CharmSavings, C:\Users\amwhite.CAD\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\http_charmsavings.com_0.indexeddb.leveldb\MANIFEST-000001, Quarantined, [29515df9682367cfd0b3482bb34f7987],

Physical Sectors: 0
(No malicious items detected)


(end)

#4 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:04:20 AM

Posted 13 October 2015 - 01:28 PM

Emsisoft Emergency Kit

Please download Emsisoft Emergency Kit and save it to your desktop. Double click on the EmsisoftEmergencyKit file you downloaded to extract its contents and create a shortcut on the desktop. Leave all settings as they are and click the Extract button at the bottom. A folder named EEK will be created in the root of the drive (usually c:\).

  • After extraction please double-click on the new Start Emsisoft Emergency Kit icon on your desktop.
  • The first time you launch it, Emsisoft Emergency Kit will recommend that you allow it to download updates. Please click Yes so that it downloads the latest database updates.
  • When the update process is complete, a new button will appear in the lower-left corner that says Back. Click on this button to return to the Overview screen.
  • Click on Scan to be taken to the scan options. If you are asked if you want the scanner to scan for Potentially Unwanted Programs, then click Yes.
  • Click on the Malware Scan button to start the scan.
  • When the scan is completed click the Quarantine selected objects button. Note, this option is only available if malicious objects were detected during the scan.
  • When the threats have been quarantined, click the View report button in the lower-right corner, and the scan log will be opened in Notepad.
  • Please save the log in Notepad on your desktop, and attach it to your next reply.
  • When you close Emsisoft Emergency Kit, it will give you an option to sign up for a newsletter. This is optional, and is not necessary for the malware removal process.

I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#5 slikk24

slikk24
  • Topic Starter

  • Members
  • 69 posts
  • OFFLINE
  •  
  • Local time:08:20 PM

Posted 13 October 2015 - 03:15 PM

Emsisoft Emergency Kit - Version 10.0
Last update: 10/13/2015 2:54:39 PM
User account: CAD\rbailey

Scan settings:

Scan type: Malware Scan
Objects: Rootkits, Memory, Traces, Files

Detect PUPs: On
Scan archives: Off
ADS Scan: On
File extension filter: Off
Advanced caching: On
Direct disk access: Off

Scan start: 10/13/2015 2:55:16 PM
C:\Users\mbrower\AppData\Local\Temp\APN-Stub detected: Application.Win32.WebToolbar (A)
Value: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1118\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLETASKMGR detected: Setting.DisableTaskMgr (A)
Value: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1118\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS detected: Setting.DisableRegistryTools (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\CONDUIT detected: Application.InstallAd (A)
Value: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN -> SEARCHPROTECT detected: Application.AdStart (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{3EF64538-8B54-4573-B48F-4D34B0238AB2} detected: Application.BHO (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1118\SOFTWARE\AOL TOOLBAR detected: Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\AOL TOOLBAR detected: Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1217\SOFTWARE\AOL TOOLBAR detected: Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\SEARCHPROTECT detected: Application.InstallAd (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\AOL TOOLBAR detected: Application.InstallAd (A)
C:\Users\rbailey\AppData\Local\Temp\WinFixProPackage.exe detected: Gen:Variant.Adware.Strictor.92515 ( B)

Scanned 221948
Found 12

Scan end: 10/13/2015 3:11:57 PM
Scan time: 0:16:41

C:\Users\rbailey\AppData\Local\Temp\WinFixProPackage.exe Quarantined Gen:Variant.Adware.Strictor.92515 ( B)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\AOL TOOLBAR Quarantined Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\SEARCHPROTECT Quarantined Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1217\SOFTWARE\AOL TOOLBAR Quarantined Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\AOL TOOLBAR Quarantined Application.InstallAd (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1118\SOFTWARE\AOL TOOLBAR Quarantined Application.InstallAd (A)
Key: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\EXPLORER\BROWSER HELPER OBJECTS\{3EF64538-8B54-4573-B48F-4D34B0238AB2} Quarantined Application.BHO (A)
Value: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN -> SEARCHPROTECT Quarantined Application.AdStart (A)
Key: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1121\SOFTWARE\CONDUIT Quarantined Application.InstallAd (A)
Value: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1118\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLEREGISTRYTOOLS Quarantined Setting.DisableRegistryTools (A)
Value: HKEY_USERS\S-1-5-21-1607477280-1921176570-848803576-1118\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\SYSTEM -> DISABLETASKMGR Quarantined Setting.DisableTaskMgr (A)
C:\Users\mbrower\AppData\Local\Temp\APN-Stub Quarantined Application.Win32.WebToolbar (A)

Quarantined 12

#6 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:04:20 AM

Posted 13 October 2015 - 03:30 PM

Do you still have problems?


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 


#7 slikk24

slikk24
  • Topic Starter

  • Members
  • 69 posts
  • OFFLINE
  •  
  • Local time:08:20 PM

Posted 13 October 2015 - 03:51 PM

No i believe everthing is back to normal.  Thanks for your help with this issue!



#8 severac

severac

  • Members
  • 872 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Serbia
  • Local time:04:20 AM

Posted 14 October 2015 - 01:36 AM

Great.

 

Empty your temp folders using TFC (Temporary File Cleaner)

§  Please download TFC by Old Timer and save it to your desktop.
alternate download link

§  Save any unsaved work. (TFC will close ALL open programs including your browser!)

§  Double-click on TFC.exe to run it. (If you are using Vista or above, right-click on the file and choose "Run As Administrator".)

§  Click the Start button to begin the cleaning process and let it run uninterrupted to completion.

§  Important! If TFC prompts you to reboot, please do so immediately. If not prompted, manually reboot the machine anyway allowing Windows to load normally (not into Safe Mode) to ensure a complete clean.

 

--------

This step will remove all cleaning tools we used, it'll reset restore points (so you won't get reinfected by accidentally using some older restore point) and it'll make some other minor adjustments...
This is a very crucial step so make sure you don't skip it.
Download  DelFix by Xplode to your desktop. Delfix will delete all the used tools and logfiles.

Double-click Delfix.exe to start the tool.
Make sure the following items are checked:

§  Activate UAC (optional; some users prefer to keep it off)

§  Remove disinfection tools

§  Create registry backup

§  Purge System Restore

Now click "Run" and wait patiently.
Once finished, a logfile will be created. You don't have to attach it to your next reply.


I would like to help you to remove malware. Let's look inside.   :busy:

But I don't know to solve all PC problems.  :smash: 

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users