Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Malware that keeps installing itself (or something)


  • Please log in to reply
3 replies to this topic

#1 Keqaxk

Keqaxk

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:18 AM

Posted 29 May 2016 - 04:50 AM

I have looked all over for help both online and in person and I cannot find a solution to this problem.

 

In my Local Disk (C:) I have this malware that keeps coming back over and over again after being deleted.  It is called keqaxk and it says it is a shortcut to ms-dos program.

a9d79b78ef.png

 

Every single time I run malwarebytes it is detected

e05093e257.png

 

 

Malwarebytes then removes it restarts my computer and it is back never failing to return.

 

I have also tried using AdwCleaner and it has not worked. When running Adware Removal tool by TSA it is not detected.

 

One thing I have also noticed is that my google chrome crashes every 45-60 minutes however I am unsure if it is related to this.

 

I am using Windows 7.

 

I don't know if the below image helps at all but this is the general tab for when I check the properties of this.

 

d43de8c0b2.png

 

I have had this on my computer for well over a month and would greatly appreciate all the support possible in removing this permanently.


Edited by Keqaxk, 29 May 2016 - 05:03 AM.


BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • Moderator
  • 13,396 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:12:18 AM

Posted 29 May 2016 - 06:05 AM

Welcome to BC....

 

Which program are you using that is detecting the file as malicious?

 

Please submit the file to VirusTotal - Free Online Virus and Malware Scan where it will be scanned by numerous security programs.

 

Reset Google Chrome

You can restore your browser settings in Chrome at any time. You might need to do this if apps or extensions you installed changed your settings without your knowledge. Your saved bookmarks and passwords won't be cleared or changed.

  1. Open Chrome.
  2. In the top right, click the icon you see: Menu  or More
  3. Click Settings.
  4. At the bottom, click Show advanced settings.
  5. Under the section "Reset settings,” click Reset settings.
  6. In the box that appears, click Reset. ​

I know you have used one or more of the programs below but please use them again with settings below and post their

their results.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).

  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • When MBAM is finished scanning it will display a screen that displays any malware that it has detected.
  • Click the Remove Selected button.
  • MBAM will now delete all of the files and registry keys and add them to the programs quarantine. When removing the files, MBAM may require a reboot in order to remove some of them. If it displays a message stating that it needs to reboot, please allow it to do so.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.

POST THE LOG FOR  REVIEW.

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message
  • Hold down Control and click on this link to open ESET OnlineScan in a new window.
  • Click the esetonlinebtn.png button.
  • For alternate browsers only: (Microsoft Internet Explorer users can skip these steps)
  • Click on esetsmartinstaller_enu.exe to download the ESET Smart Installer. Save it to your desktop.
  • Double click on the esetsmartinstaller_enu.png icon on your desktop.
  • Check "YES, I accept the Terms of Use."
  • Click the Start button.
  • Accept any security warnings from your browser.
  • Under scan settings, check "Scan Archives" and "Remove found threats"
  • ESET will then download updates for itself, install itself, and begin scanning your computer. Please be patient as this can take some time.
  • When the scan completes, click List Threats
  • Click Export, and save the file to your desktop using a unique name, such as ESETScan. Include the contents of this report in your next reply.
  • Click the Back button.
  • Click the Finish button.
  • NOTE:Sometimes if ESET finds no infections it will not create a log.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”

#3 Keqaxk

Keqaxk
  • Topic Starter

  • Members
  • 2 posts
  • OFFLINE
  •  
  • Local time:01:18 AM

Posted 29 May 2016 - 02:53 PM

Malwarebytes is the program that is detecting the file as being malicious. Here are some logs and an image of what you have suggested.

 

Virus Total

7b324b8d20.png


AdwCleaner Log

# AdwCleaner v5.118 - Logfile created 29/05/2016 at 14:44:11
# Updated 23/05/2016 by Xplode
# Database : 2016-05-29.1 [Server]
# Operating system : Windows 7 Professional Service Pack 1 (X64)
# Username : Randy - RANDY-PC
# Running from : W:\DownloadsPrimary\adwcleaner_5.118.exe
# Option : Clean
# Support : http://toolslib.net/forum

***** [ Services ] *****


***** [ Folders ] *****


***** [ Files ] *****


***** [ DLLs ] *****


***** [ WMI ] *****


***** [ Shortcuts ] *****


***** [ Scheduled tasks ] *****


***** [ Registry ] *****


***** [ Web browsers ] *****

[-] [C:\Users\Randy\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : aol.com
[-] [C:\Users\Randy\AppData\Local\Google\Chrome\User Data\Default\Web Data] [Search Provider] Deleted : ask.com

*************************

:: "Tracing" keys deleted
:: Winsock settings cleared

*************************

C:\AdwCleaner\AdwCleaner[C1].txt - [2997 bytes] - [17/04/2016 17:48:22]
C:\AdwCleaner\AdwCleaner[C2].txt - [1735 bytes] - [29/05/2016 04:56:25]
C:\AdwCleaner\AdwCleaner[C3].txt - [1102 bytes] - [29/05/2016 14:44:11]
C:\AdwCleaner\AdwCleaner[S1].txt - [1997 bytes] - [15/04/2016 17:04:07]
C:\AdwCleaner\AdwCleaner[S2].txt - [1123 bytes] - [15/04/2016 17:11:21]
C:\AdwCleaner\AdwCleaner[S4].txt - [3084 bytes] - [17/04/2016 17:47:48]
C:\AdwCleaner\AdwCleaner[S6].txt - [1055 bytes] - [17/04/2016 18:04:12]
C:\AdwCleaner\AdwCleaner[S7].txt - [1129 bytes] - [23/04/2016 13:17:18]
C:\AdwCleaner\AdwCleaner[S8].txt - [1555 bytes] - [29/05/2016 04:54:58]
C:\AdwCleaner\AdwCleaner[S9].txt - [1591 bytes] - [29/05/2016 14:43:43]

########## EOF - C:\AdwCleaner\AdwCleaner[C3].txt - [1686 bytes] ##########


Malwarebytes Log
Malwarebytes Anti-Malware
www.malwarebytes.org

Scan Date: 5/29/2016
Scan Time: 4:45 AM
Logfile: keq.txt
Administrator: Yes

Version: 2.2.1.1043
Malware Database: v2016.05.29.03
Rootkit Database: v2016.05.27.01
License: Free
Malware Protection: Disabled
Malicious Website Protection: Disabled
Self-protection: Disabled

OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Randy

Scan Type: Threat Scan
Result: Completed
Objects Scanned: 306220
Time Elapsed: 2 min, 26 sec

Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

Processes: 1
Trojan.MalPack.Gen, C:\keqaxk.pif, 8652, Delete-on-Reboot, [9710ab3078212f0704c2121b6899e818]

Modules: 0
(No malicious items detected)

Registry Keys: 0
(No malicious items detected)

Registry Values: 0
(No malicious items detected)

Registry Data: 3
PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER|AntiVirusDisableNotify, 1, Good: (0), Bad: (1),Replaced,[9215b02b3f5a2016401e4a0e8d77ff01]
PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER|FirewallDisableNotify, 1, Good: (0), Bad: (1),Replaced,[aff8e6f5930664d20b545800f212c23e]
PUM.Optional.DisabledSecurityCenter, HKLM\SOFTWARE\WOW6432NODE\MICROSOFT\SECURITY CENTER|UpdatesDisableNotify, 1, Good: (0), Bad: (1),Replaced,[b3f4706bbedbf442e57bb2a69173d32d]

Folders: 0
(No malicious items detected)

Files: 2
Trojan.MalPack.Gen, C:\keqaxk.pif, Quarantined, [9710ab3078212f0704c2121b6899e818],
Trojan.MalPack.Gen, C:\$Recycle.Bin\S-1-5-21-3587316961-1329611508-3771285748-1000\$RQ437YI.pif, Quarantined, [8324ab30d6c3999d616579b4b34ea45c],

Physical Sectors: 0
(No malicious items detected)


(end)

 

JRT Log

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.0.6 (04.25.2016)
Operating System: Windows 7 Professional x64
Ran by Randy (Administrator) on Sun 05/29/2016 at  4:59:38.11
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~




File System: 45

Successfully deleted: C:\ProgramData\Start Menu\Programs\clipgrab (Folder)
Successfully deleted: C:\Users\Public\Desktop\clipgrab.lnk (Shortcut)
Successfully deleted: C:\Users\Randy\AppData\Local\Google\Chrome\User Data\Default\Extensions\gkojfkhlekighikafcpjkiklfbnlmeio (Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Google\Chrome\User Data\Default\Local Storage\chrome-extension_gkojfkhlekighikafcpjkiklfbnlmeio_0.localstorage (File)
Successfully deleted: C:\Program Files (x86)\clipgrab (Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0YCFK1L0 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1QAIJE9M (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3SX7IZEC (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7TX2BCZ8 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9W1RZQEP (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYE5IMGN (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HPRH3EN8 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JLT6QTJA (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LA37S2E2 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIINBYD9 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MBR1JHFF (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OKKUFP76 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SY909KRS (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UFEZO9ST (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z66EY659 (Temporary Internet Files Folder)
Successfully deleted: C:\Users\Randy\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZQ4DTWRE (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0YCFK1L0 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1QAIJE9M (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3SX7IZEC (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7TX2BCZ8 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9W1RZQEP (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BYE5IMGN (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HPRH3EN8 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JLT6QTJA (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LA37S2E2 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIINBYD9 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MBR1JHFF (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OKKUFP76 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SY909KRS (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UFEZO9ST (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z66EY659 (Temporary Internet Files Folder)
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZQ4DTWRE (Temporary Internet Files Folder)



Registry: 0





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Sun 05/29/2016 at  5:00:24.29
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


 



#4 buddy215

buddy215

  • Moderator
  • 13,396 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:12:18 AM

Posted 29 May 2016 - 03:17 PM

What about the Eset Online Scan....did it find anything?

 

Would you please post a link to the VirusTotal scan results.

 

If Eset comes up clean and MBAM keeps finding the malware, you need to start a new topic.

 

Please follow the instructions in the Malware Removal and Log Section Preparation Guide starting at Step 6.

  • If you cannot complete a step, then skip it and continue with the next.
  • In Step 6 there are instructions for downloading and running FRST which will create two logs.

When you have done that, post your logs in the Virus, Trojan, Spyware, and Malware Removal Logs forum, NOT here, for assistance by the Malware Response Team.

Start a new topic, give it a relevant title and post your log(s) along with a brief description of your problem, a summary of any anti-malware tools you have used and a summary of any steps that you have performed on your own. If you cannot produce any of the required logs...start the new topic anyway. Explain that you followed the Prep. Guide, were unable to create the logs, and describe what happened when you tried to create them. A member of the Malware Removal Team will walk you through, step by step, on how to clean your computer.

After doing this, please reply back in this thread with a link to the new topic so we can close this one.

 

DO NOT bump your new topic. Wait for a response from one of the Team Members.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss
A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users