Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware Removal - Need Help


  • Please log in to reply
8 replies to this topic

#1 nbarr7655

nbarr7655

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 01 February 2016 - 03:25 PM

Alright. I hope this is the right forum section to be posting under. If not, please feel free to move it. :) Onward!

 

I work at a bank in the IT department. We have roughly 150 pc's that we manage. Some of these PC's connect to a terminal server, others don't. However we have been having some issues lately with people getting loads of popups. I myself actually just ran into this issue today.

 

What is happening: A user will be using the internet and all of a sudden the entire page turns into one big link. So, no matter where or what you click it will open another window. Of course it's the usual popups stating that your computer is infected and call this number, blah blah blah. So, we then run Malwarebytes. It is pretty much guaranteed to find something. Usually it finds anywhere from 3-20 things. Some of these are PuP's, others are registry keys.

 

So, after running the scan and removing the bad files I tell them they should be good to go. It usually only lasts a day or two though before we get another call and they are telling us that they are infected again and getting popups. So, we repeat.

 

What is the deal? I have tried cleaning junk files and then scanning. No luck. The issue seems to happen with any site really. When it happened to me I was actually on this website haha. Other users have it happen from the Weather Channel's website. They were using Internet Explorer so we told them to switch to Chrome. That worked for a while but now the issue is happening again.

 

I am sure I am missing some finer details of this so if you have any questions, please ask. I am wondering, should I use something other than Malwarebytes? We would prefer something that can run while the user is logged on.

 

Users are all running windows 7 x64.



BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,134 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:09:39 PM

Posted 01 February 2016 - 07:56 PM

Sometimes it as simple as emptying the browsers cache. In other cases adware is the culprit and its removal can vary

from just using AdwCleaner, Junkware Removal Tool and Eset Online Scanner. Using CCleaner clean up is a good idea, too.

It is also common to see some trojan dropper installing the adware.

 

Rebooting the computer would be necessary to completely remove adware and malware in most cases. MBAM asks to do that, too.

 

Here is the usual instructions for using the programs mentioned above.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
  • Click the Remove Selected button.
  • MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR  REVIEW.

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

Resetting Chrome is often necessary.

 

You can reset your browser settings in Chrome any time. You might need to do this if apps or extensions you installed changed your settings without your knowledge. Your saved bookmarks and passwords won't be cleared or changed.

  1. Open Chrome.
  2. In the top right, click the Chrome menu
  3. Click Settings.
  4. At the bottom, click Show advanced settings.
  5. Under the section "Reset settings,” click Reset settings.
  6. In the box that appears, click Reset.

 


Edited by buddy215, 01 February 2016 - 07:59 PM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 nbarr7655

nbarr7655
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 02 February 2016 - 11:06 AM

Thank you for all of the great info. I myself was infected and was kind of OK with it since I was hoping to gather as much info as I could about the issue. However of course, I managed to clean it up (for now) right before you had replied. Below though I have provided a log of another user that I had scanned a couple of days ago. This is pretty similar to what other users are getting. The following log is from mbam:

 

Malwarebytes Anti-Malware
www.malwarebytes.org
 
Scan Date: 1/30/2016
Scan Time: 8:21 AM
Logfile: 
Administrator: Yes
 
Version: 2.2.0.1024
Malware Database: v2016.01.30.02
Rootkit Database: v2016.01.20.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled
 
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: njbarr
 
Scan Type: Custom Scan
Result: Completed
Objects Scanned: 854485
Time Elapsed: 2 hr, 13 min, 32 sec
 
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
Processes: 0
(No malicious items detected)
 
Modules: 0
(No malicious items detected)
 
Registry Keys: 0
(No malicious items detected)
 
Registry Values: 8
Hijack.ControlPanelStyle, HKU\S-1-5-21-1848196154-734005423-1691616715-25129\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [8b3f7ec1841521154720281d748fcd33]
Hijack.ControlPanelStyle, HKU\S-1-5-21-1848196154-734005423-1691616715-27291\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [19b181be8c0d76c0d097ac998182df21]
Hijack.ControlPanelStyle, HKU\S-1-5-21-1848196154-734005423-1691616715-27293\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [efdb033ce7b2c2745e092c1960a3b34d]
Hijack.ControlPanelStyle, HKU\S-1-5-21-1848196154-734005423-1691616715-34064\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [4b7fcb7461382d090d5a61e453b00af6]
Hijack.ControlPanelStyle, HKU\S-1-5-21-1848196154-734005423-1691616715-36169\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [6169ca75b0e9da5ced7ae3626a994cb4]
Hijack.ControlPanelStyle, HKU\S-1-5-21-1848196154-734005423-1691616715-38552\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [16b4da65b1e81a1c3730d174c43f6a96]
Hijack.ControlPanelStyle, HKU\S-1-5-21-1848196154-734005423-1691616715-40120\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [2e9c0b34b6e341f5d98e7ec7e71c7d83]
Hijack.ControlPanelStyle, HKU\S-1-5-21-3664269552-3844541576-1221663781-500\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\POLICIES\EXPLORER|ForceClassicControlPanel, 1, , [b119310e92071026ec7b2c19b64d0000]
 
Registry Data: 0
(No malicious items detected)
 
Folders: 0
(No malicious items detected)
 
Files: 16
PUP.Optional.PricePeep, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.pricepeep00.pricepeep.net_0.localstorage, , [e2e873ccddbcd85e087fbb2b6e956c94], 
PUP.Optional.PricePeep, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_static.pricepeep00.pricepeep.net_0.localstorage-journal, , [6367d9665841b87edcabd80e9f64b64a], 
PUP.Optional.ReMarkable, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage, , [ae1c0936abee1d19682e39af689b42be], 
PUP.Optional.ReMarkable, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_static.re-markable00.re-markable.net_0.localstorage-journal, , [9c2e58e702976cca6f274b9d5ea5b44c], 
PUP.Optional.UTop, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_utop.it_0.localstorage, , [e4e69fa0c1d8f44218b505f133d023dd], 
PUP.Optional.UTop, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_utop.it_0.localstorage-journal, , [9634f14e8019f046b31a29cd9370d52b], 
PUP.Optional.PastaLeads, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_nps.pastaleads.com_0.localstorage, , [6268102f415838fe4a6447bef311619f], 
PUP.Optional.PastaLeads, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_nps.pastaleads.com_0.localstorage-journal, , [8248102fbedbbf77199548bd877d26da], 
PUP.Optional.BestPriceNinja, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pstatic.bestpriceninja.com_0.localstorage, , [e0eae25de7b2e84e2e29f94453b1837d], 
PUP.Optional.BestPriceNinja, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pstatic.bestpriceninja.com_0.localstorage-journal, , [b119f44b504938fe4017b687b64e3bc5], 
PUP.Optional.PCKeeper, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_app.pckeeper.com_0.localstorage, , [5d6d8cb3adec979ff6cca6980400966a], 
PUP.Optional.PCKeeper, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_app.pckeeper.com_0.localstorage-journal, , [3298f44b45544ceadbe780beab59a759], 
PUP.Optional.eShopComp, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pstatic.eshopcomp.com_0.localstorage, , [61691e21bcddb0864b0059e98d77c838], 
PUP.Optional.eShopComp, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\http_pstatic.eshopcomp.com_0.localstorage-journal, , [bc0ec07fd7c23bfb80cb2022d52f7e82], 
PUP.Optional.CrossRider, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage, , [3d8dc07fa4f55bdbb7fc82c3cf3534cc], 
PUP.Optional.CrossRider, C:\Users\emuehlberger\AppData\Local\Google\Chrome\User Data\Default\Local Storage\https_d19tqk5t6qcjac.cloudfront.net_0.localstorage-journal, , [2b9f72cdcbce171ff3c095b0e81c946c], 
 
Physical Sectors: 0
(No malicious items detected)
 
 
(end)
 
I also will include a picture of the history for the past couple of scans on my own machine:
jUK4d1m.jpg

Edited by nbarr7655, 02 February 2016 - 11:11 AM.


#4 buddy215

buddy215

  • Moderator
  • 13,134 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:09:39 PM

Posted 02 February 2016 - 11:52 AM

I often see in this forum users that have the same adware on multiple smart phones and computers in their home. One step to cleaning

that up is to Reset The Router and then securing the router using a custom password, blocking remote access and making sure the

router's firewall is enabled. That's the basics.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#5 nbarr7655

nbarr7655
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 02 February 2016 - 02:39 PM

I often see in this forum users that have the same adware on multiple smart phones and computers in their home. One step to cleaning

that up is to Reset The Router and then securing the router using a custom password, blocking remote access and making sure the

router's firewall is enabled. That's the basics.

 

However, in this case this is happening at my work with multiple users across our network.



#6 buddy215

buddy215

  • Moderator
  • 13,134 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:09:39 PM

Posted 02 February 2016 - 02:51 PM

I know practically zip about cleaning up such a large network of computers. You mentioned 'terminal server...if that

is a Windows server you should be able to run the programs on it...right? Other than that...call the IT Dept...:)


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#7 nbarr7655

nbarr7655
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 02 February 2016 - 03:42 PM

I know practically zip about cleaning up such a large network of computers. You mentioned 'terminal server...if that

is a Windows server you should be able to run the programs on it...right? Other than that...call the IT Dept... :)

 

We plan to run some programs inside the terminal servers to clean those up as well. As far as calling the IT department, that's where I work haha.



#8 Jaycan

Jaycan

  • Members
  • 445 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:12:39 PM

Posted 02 February 2016 - 04:08 PM

Hello..

 

Just as an add to the wonderful work by buddy215, always make sure that any Free programs are available for use on commercial, or multiple systems.

 

You may find a small fee or license applies in certain circumstances. Other times a "donation request" is made to help develop these Free for Personal Use programs.

 

This is no more than one IT worker to another IT worker, and is not meant to intimidate you, but please read at least the basic "conditions of use" listed with each program.

We "throw them at you" as we always expect you to be a home user, and these programs are free for home users.

 

Thank You (did not mean to interrupt your work)  :)



#9 nbarr7655

nbarr7655
  • Topic Starter

  • Members
  • 19 posts
  • OFFLINE
  •  
  • Local time:03:39 AM

Posted 02 February 2016 - 08:47 PM

Hello..

 

Just as an add to the wonderful work by buddy215, always make sure that any Free programs are available for use on commercial, or multiple systems.

 

You may find a small fee or license applies in certain circumstances. Other times a "donation request" is made to help develop these Free for Personal Use programs.

 

This is no more than one IT worker to another IT worker, and is not meant to intimidate you, but please read at least the basic "conditions of use" listed with each program.

We "throw them at you" as we always expect you to be a home user, and these programs are free for home users.

 

Thank You (did not mean to interrupt your work)  :)

 

Thank you. I took no intimidation from it but instead took it as a reminder. I often have to remind myself that when I am at work, things are a little different. Usually I test various programs on my own machine before proceeding any further. If we do decide to use the program then the company always makes sure to purchase the proper licenses. :)






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users