Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Untrustworthy looking google ads that lead to legit websites


  • This topic is locked This topic is locked
32 replies to this topic

#1 gesman5000

gesman5000

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 25 December 2016 - 04:06 AM

I have been getting legitimate ads but they are displayed in an unusual way i already wiped my pc.Attached File  IMG_2711.PNG   470.5KB   0 downloads

BC AdBot (Login to Remove)

 


#2 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 25 December 2016 - 05:22 AM

Attached File  FRST.txt   96.43KB   7 downloads

Attached File  Addition.txt   25.45KB   3 downloads



#3 nasdaq

nasdaq

  • Malware Response Team
  • 38,950 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:35 PM

Posted 25 December 2016 - 11:15 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

ATTENTION: System Restore is disabled
Turn System Restore On for Drives in Windows 10
http://www.tenforums.com/tutorials/4533-system-protection-turn-off-drives-windows-10-a.html
===

Press the windows key Windows_Logo_key.gif+ r on your keyboard at the same time. This will open the RUN BOX.
Type Notepad and and click the OK key.

Please copy the entire contents of the code box below to a new file.


Start

CreateRestorePoint:
EmptyTemp:
CloseProcesses:

CHR Extension: (Chrome Web Store Payments) - C:\Users\Gesan\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2016-12-23]
CHR Extension: (Chrome Media Router) - C:\Users\Gesan\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2016-12-23]

Reboot:

End
Save the file as fixlist.txt in the same folder where the Farbar tool is running from.
The location is listed in the 3rd line of the Farbar log you have submitted.

Run FRST and click Fix only once and wait.

The tool will create a log (Fixlog.txt) please post it to your reply.

===

Reset Chrome...
Open Google Chrome, click on menu icon google-chrome-setting-icon.png which is located right side top of the google chrome.
 
Click "Settings" then "Show advanced settings" at the bottom of the screen.
 
Click "Reset browser settings" button.
 
Restart Chrome.
===

Please let me know what problem persists with this computer.

p.s.
Your topics have been merged.

#4 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 25 December 2016 - 06:48 PM

Fix result of Farbar Recovery Scan Tool (x64) Version: 21-12-2016
Ran by Gesan (26-12-2016 10:43:37) Run:1
Running from A:\Downloads
Loaded Profiles: Gesan (Available Profiles: Gesan)
Boot Mode: Normal
==============================================
 
fixlist content:
*****************
Start
 
CreateRestorePoint:
EmptyTemp:
CloseProcesses:
 
CHR Extension: (Chrome Web Store Payments) - C:\Users\Gesan\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda [2016-12-23]
CHR Extension: (Chrome Media Router) - C:\Users\Gesan\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm [2016-12-23]
 
Reboot:
 
End
*****************
 
Restore point was successfully created.
Processes closed successfully.
C:\Users\Gesan\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda => moved successfully
C:\Users\Gesan\AppData\Local\Google\Chrome\User Data\Default\Extensions\pkedcjkdefgpdelpbcmbmeomcjbeemfm => moved successfully
 
=========== EmptyTemp: ==========
 
BITS transfer queue => 2240384 B
DOMStore, IE Recovery, AppCache, Feeds Cache, Thumbcache, IconCache => 19060884 B
Java, Flash, Steam htmlcache => 37270262 B
Windows/system/drivers => 6799933 B
Edge => 8678247 B
Chrome => 470548695 B
Firefox => 0 B
Opera => 0 B
 
Temp, IE cache, history, cookies, recent:
Default => 0 B
Users => 0 B
ProgramData => 0 B
Public => 0 B
systemprofile => 0 B
systemprofile32 => 0 B
LocalService => 0 B
NetworkService => 28772 B
Gesan => 33557829 B
 
RecycleBin => 8158377147 B
EmptyTemp: => 8.1 GB temporary data Removed.
 
================================
 
 
The system needed a reboot.
 
==== End of Fixlog 10:43:52 ====


#5 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 12:38 AM

I am still experiencing the same problem

#6 nasdaq

nasdaq

  • Malware Response Team
  • 38,950 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:35 PM

Posted 26 December 2016 - 07:55 AM

Run this cleaning tool.

Temporarily disable your AV program so it does not interfere.
Info on how to disable your security applications How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs - Security Mini-Guides.

Download Zoek tool from here

When the download appears, save to the Desktop.
On the Desktop, right-click the Zoek.exe file and select: Run as Administrator
(Give it a few seconds to appear.)

Next, copy/paste the entire script inside the code box below to the input field of Zoek:
createsrpoint;
autoclean;
emptyclsid;
emptyffcache;
FFdefaults;
emptyiecache;
iedefaults;
emptychrcache;
CHRdefaults;
emptyalltemp;
emptyfolderscheck;delete
ipconfig /flushdns;b
Now...
Close any open Browsers.
Click the Run script button, and wait. It takes a few minutes to run all the script.

When the tool finishes, the zoek-results.log is opened in Notepad.
The log is also found on the systemdrive, normally C:\
If a reboot is needed, the log is opened after the reboot.

Please attach the zoek-results.log in your reply.
===

Also, please provide an update on how the computer is behaving after running the above script.

#7 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 08:11 AM


Zoek.exe v5.0.0.1 Updated 19-September-2016
Tool run by Gesan on Tue 12/27/2016 at  0:08:30.36.
Microsoft Windows 10 Pro 10.0.14393  x64
Running in: Normal Mode Internet Access Detected
Launched: A:\Downloads\zoek.exe [Scan all users] [Script inserted]
==== System Restore Info ======================
12/27/2016 12:08:42 AM Zoek.exe System Restore Point Created Successfully.
==== Empty Folders Check ======================
C:\PROGRA~3\Comms deleted successfully
C:\PROGRA~3\SoftwareDistribution deleted successfully
C:\Users\Gesan\AppData\Local\PeerDistRepub deleted successfully
C:\Users\Gesan\AppData\Local\VirtualStore deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistPub deleted successfully
C:\WINDOWS\serviceprofiles\networkservice\AppData\Local\PeerDistRepub deleted successfully
==== Deleting CLSID Registry Keys ======================

==== Deleting CLSID Registry Values ======================

==== Deleting Services ======================

==== Batch Command(s) Run By Tool======================

==== Deleting Files \ Folders ======================
C:\PROGRA~3\Package Cache deleted
==== Chromium Look ======================

==== Set IE to Default ======================
Old Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
No DefaultScope Set For HKCU
New Values:
[HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main]
"Start Page"="http://go.microsoft.com/fwlink/p/?LinkId=255141"
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\SearchScopes]
"DefaultScope"="{012E1000-F331-11DB-8314-0800200C9A66}"
==== All HKLM and HKCU SearchScopes ======================
HKLM\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKLM\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
HKLM\Wow6432Node\SearchScopes "DefaultScope"="{0633EE93-D776-472f-A0FF-E1416B8B2E3A}"
HKLM\Wow6432Node\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&FORM=IE8SRC
HKCU\SearchScopes "DefaultScope"="{012E1000-F331-11DB-8314-0800200C9A66}"
HKCU\SearchScopes\{012E1000-F331-11DB-8314-0800200C9A66} - http://www.google.com/search?q={searchTerms}
HKCU\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} - http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IE8SRC
==== Reset Google Chrome ======================
Nothing found to reset
==== Empty IE Cache ======================
C:\WINDOWS\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 emptied successfully
C:\Users\Gesan\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\WINDOWS\sysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 emptied successfully
C:\Users\Gesan\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\SysNative\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
C:\WINDOWS\sysWoW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE emptied successfully
==== Empty FireFox Cache ======================
No FireFox Profiles found
==== Empty Chrome Cache ======================
No Chrome User Data found
==== Empty All Flash Cache ======================
No Flash Cache Found
==== Empty All Java Cache ======================
No Java Cache Found
==== C:\zoek_backup content ======================
C:\zoek_backup (files=25 folders=29 28110730 bytes)
==== Empty Temp Folders ======================
C:\WINDOWS\Temp will be emptied at reboot
==== After Reboot ======================
==== Empty Temp Folders ======================
C:\WINDOWS\Temp successfully emptied
C:\Users\Gesan\AppData\Local\Temp successfully emptied
==== Empty Recycle Bin ======================
C:\$RECYCLE.BIN successfully emptied
==== EOF on Tue 12/27/2016 at  0:18:33.90 ======================

Ok bleeping computer seems to be now free of ads but how to geek still seems to have similar ads with a very shifty looking james packer ads for this website which seems to have a really weird URL http://citizen.com.au.co-corp.org which I can now confirm is a malicious website and the original website used groove post still has the ads.


Edited by gesman5000, 26 December 2016 - 08:30 AM.


#8 nasdaq

nasdaq

  • Malware Response Team
  • 38,950 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:35 PM

Posted 26 December 2016 - 09:05 AM


Are you referring to this forum?

http://www.howtogeek.com/

I can only suggest you clear all the cookies associated with that site.

If that does not solve the problem check with them.

#9 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 09:08 AM

Yes but I am getting http://citizen.com.au.co-corp.org/ ads on every website with google ads and I can confirm this website is 100% malicious. The adware is still present of every website I visit except bleeping computer even youtube a supposedly safe website seems to contain the ad. 


Edited by gesman5000, 26 December 2016 - 09:22 AM.


#10 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 09:36 AM

Hitman Pro seems to have alleviated the issue but what would you recommend so this doesn't occur again and the minute I said that the malicious adware occurs again the cookies keep recurring and I do not want them

Cookies _____________________________________________________________________
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\0KNJEUFY.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\17UEPVIK.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\1RYUKCXN.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\1T6JIICO.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\2A4PYK6D.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\2AU615I7.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\2DJ82Q10.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\2KRCC55F.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\36M4MCA3.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\409LTUED.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\4AX36N33.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\4K38Y1UB.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\4T2X313H.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\526OW52W.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\592Y9WKX.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\5F0FC0ST.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\5H9DEUFM.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\7CCPJNJA.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\9IV2N4QO.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\9JO7SWRB.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\AMMXZ14L.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\AOQ3HMMC.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\APL6IX1Q.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\C7KIAENW.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\CORTV3FN.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\CRKM68IT.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\F5Z9XIL0.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\GA6VNMLB.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\IDNPOX0K.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\IFK1FK3B.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\IJEZ27MH.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\JFBZQX61.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\JV73OG07.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\JZFPXXKO.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\L056CRTC.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\MCY46KT1.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\MP3OLFJS.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\NJ4T17AP.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\NN4Q0WNK.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\OLBT1G8M.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\Q5ZB4SSO.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\QYM1X6TN.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\RREQOB2H.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\RUUPMVKI.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\RYFF48HA.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\S9Y2C1NM.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\T78M9E24.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\U1VVAEI8.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\URP9WTMX.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\VXMKDFC6.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\VYH5EH8O.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\W7KAZMGL.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\WYHOZG9P.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\X2HUEX0S.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\57VBQ3B1.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\86OWOPUP.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\LVNHF8NR.cookie
   C:\Users\Gesan\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\XHOOY7E1.cookie

[/code] Even after I block all cookies the adware goes for a while but after a couple refreshes its back.

Edited by gesman5000, 26 December 2016 - 09:48 AM.


#11 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 09:55 AM

Even with avast when i deleted the cookies they reappeared. What is wrong? I checked my router and the DNS is not changed



#12 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 10:09 AM

OMG this certain spyware cookie will not go away it is called Tribal Fusion



#13 nasdaq

nasdaq

  • Malware Response Team
  • 38,950 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:07:35 PM

Posted 26 December 2016 - 10:37 AM

Download Malwarebytes' Anti-Malware from Here

Double-click mbam-setup-2.X.X.XXXX.exe to install the application (X's are the current version number).
  • Make sure a checkmark is placed next to Launch Malwarebytes' Anti-Malware, then click Finish.
  • Once MBAM opens, when it says Your databases are out of date, click the Fix Now button.
  • Click the Settings tab at the top, and then in the left column, select Detections and Protections, and if not already checked place a checkmark in the selection box for Scan for rootkits.
  • Click the Scan tab at the top of the program window, select Threat Scan and click the Scan Now button.
  • If you receive a message that updates are available, click the Update Now button (the update will be downloaded, installed, and the scan will start).
  • The scan may take some time to finish,so please be patient.
  • If potential threats are detected, ensure that Quarantine is selected as the Action for all the listed items, and click the Apply Actions button.
  • While still on the Scan tab, click the link for View detailed log, and in the window that opens click the Export button, select Text file (*.txt), and save the log to your Desktop.
  • The log is automatically saved by MBAM and can also be viewed by clicking the History tab and then selecting Application Logs.
POST THE LOG FOR MY REVIEW.

Note:
If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately.

===

Please download AdwCleaner by Xplode onto your Desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Click the LogFile button and the report will open in Notepad.
IMPORTANT
  • If you click the Clean button all items listed in the report will be removed.
If you find some false positive items or programs that you wish to keep, Close the AdwCleaner windows.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click the Scan button and wait for the process to complete.
  • Check off the element(s) you wish to keep.
  • Click on the Clean button follow the prompts.
  • A log file will automatically open after the scan has finished.
  • Please post the content of that log file with your next answer.
  • You can find the log file at C:\AdwCleanerCx.txt (x is a number).
===

If the problem persists run this tool.
--RogueKiller--
  • Download & SAVE to your Desktop Download RogueKiller
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or above, right-click the program file and select "Run as Administrator"
  • Accept the user agreements.
  • Execute the scan and wait until it has finished.
  • If a Windows opens to explain what [PUM's] are, read about it.
  • Click the RoguKiller icon on your taksbar to return to the report.
  • Click open the Report
  • Click Export TXT button
  • Save the file as ReportRogue.txt
  • Click the Remove button to delete the items in RED
  • Click Finish and close the program.
  • Locate the ReportRogue.txt file on your Desktop and copy/paste the contents in your next.
=======

#14 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 11:22 AM

# AdwCleaner v6.041 - Logfile created 27/12/2016 at 03:03:19
# Updated on 16/12/2016 by Malwarebytes
# Database : 2016-12-26.3 [Server]
# Operating System : Windows 10 Pro  (X64)
# Username : Gesan - DESKTOP-TTVAC02
# Running from : A:\Downloads\AdwCleaner.exe
# Mode: Scan
# Support : https://www.malwarebytes.com/support
 
***** [ Services ] *****
No malicious services found.

***** [ Folders ] *****
No malicious folders found.

***** [ Files ] *****
No malicious files found.

***** [ DLL ] *****
No malicious DLLs found.

***** [ WMI ] *****
No malicious keys found.

***** [ Shortcuts ] *****
No infected shortcut found.

***** [ Scheduled Tasks ] *****
No malicious task found.

***** [ Registry ] *****
No malicious registry entries found.

***** [ Web browsers ] *****
No malicious Firefox based browser items found.
Chrome pref Found:  [C:\Users\Gesan\AppData\Local\Google\Chrome\User Data\Default\Web data] - aol.com
*************************
C:\AdwCleaner\AdwCleaner[C0].txt - [1517 Bytes] - [26/12/2016 21:02:10]
C:\AdwCleaner\AdwCleaner[C2].txt - [1109 Bytes] - [26/12/2016 21:18:57]
C:\AdwCleaner\AdwCleaner[C3].txt - [1328 Bytes] - [26/12/2016 21:26:13]
C:\AdwCleaner\AdwCleaner[C4].txt - [1474 Bytes] - [26/12/2016 21:28:03]
C:\AdwCleaner\AdwCleaner[C5].txt - [1621 Bytes] - [26/12/2016 21:30:28]
C:\AdwCleaner\AdwCleaner[S0].txt - [1511 Bytes] - [26/12/2016 21:01:48]
C:\AdwCleaner\AdwCleaner[S10].txt - [1471 Bytes] - [27/12/2016 03:03:19]
C:\AdwCleaner\AdwCleaner[S1].txt - [1277 Bytes] - [26/12/2016 21:18:48]
C:\AdwCleaner\AdwCleaner[S2].txt - [1423 Bytes] - [26/12/2016 21:24:17]
C:\AdwCleaner\AdwCleaner[S3].txt - [1496 Bytes] - [26/12/2016 21:26:08]
C:\AdwCleaner\AdwCleaner[S4].txt - [1642 Bytes] - [26/12/2016 21:28:00]
C:\AdwCleaner\AdwCleaner[S5].txt - [1788 Bytes] - [26/12/2016 21:30:22]
C:\AdwCleaner\AdwCleaner[S6].txt - [1934 Bytes] - [26/12/2016 22:04:11]
C:\AdwCleaner\AdwCleaner[S7].txt - [2008 Bytes] - [26/12/2016 23:56:49]
C:\AdwCleaner\AdwCleaner[S8].txt - [2080 Bytes] - [27/12/2016 01:22:42]
C:\AdwCleaner\AdwCleaner[S9].txt - [2153 Bytes] - [27/12/2016 01:30:14]
########## EOF - C:\AdwCleaner\AdwCleaner[S10].txt - [2202 Bytes] ##########
 
Malwarebytes
www.malwarebytes.com
-Log Details-
Scan Date: 12/27/16
Scan Time: 2:56 AM
Logfile: MalwareBytes.txt
Administrator: Yes
-Software Information-
Version: 3.0.0
Components Version: 1.0.0
Update Package Version: 1.0.862
License: Free
-System Information-
OS: Windows 10
CPU: x64
File System: NTFS
User: DESKTOP-TTVAC02\Gesan
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 365686
Time Elapsed: 2 min, 13 sec
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Enabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled

 

 

RogueKiller V12.9.0.0 (x64) [Dec 26 2016] (Free) by Adlice Software
mail : http://www.adlice.com/contact/
Feedback : http://forum.adlice.com
Website : http://www.adlice.com/download/roguekiller/
Blog : http://www.adlice.com
Operating System : Windows 10 (10.0.14393) 64 bits version
Started in : Normal mode
User : Gesan [Administrator]
Started from : C:\Program Files\RogueKiller\RogueKiller64.exe
Mode : Scan -- Date : 12/27/2016 03:06:34 (Duration : 00:07:39)
¤¤¤ Processes : 1 ¤¤¤
[Suspicious.Path] gjagent.exe(5540) -- C:\Users\Gesan\AppData\Local\Gaijin\Program Files (x86)\NetAgent\gjagent.exe[7] -> Found
¤¤¤ Registry : 4 ¤¤¤
[Suspicious.Path] (X64) HKEY_USERS\S-1-5-21-4200660225-3376323389-390048361-1001\Software\Microsoft\Windows\CurrentVersion\Run | Gaijin.Net Agent : "C:\Users\Gesan\AppData\Local\Gaijin\Program Files (x86)\NetAgent\gjagent.exe" [7] -> Found
[Suspicious.Path] (X86) HKEY_USERS\S-1-5-21-4200660225-3376323389-390048361-1001\Software\Microsoft\Windows\CurrentVersion\Run | Gaijin.Net Agent : "C:\Users\Gesan\AppData\Local\Gaijin\Program Files (x86)\NetAgent\gjagent.exe" [7] -> Found
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters | DhcpNameServer : 61.9.133.193 61.9.134.49 ([X][X])  -> Found
[PUM.Dns] (X64) HKEY_LOCAL_MACHINE\System\ControlSet001\Services\Tcpip\Parameters\Interfaces\{54a33d8d-0024-4107-8264-a2a9ee9be39d} | DhcpNameServer : 61.9.133.193 61.9.134.49 ([X][X])  -> Found
¤¤¤ Tasks : 0 ¤¤¤
¤¤¤ Files : 0 ¤¤¤
¤¤¤ WMI : 0 ¤¤¤
¤¤¤ Hosts File : 0 ¤¤¤
¤¤¤ Antirootkit : 0 (Driver: Loaded) ¤¤¤
¤¤¤ Web browsers : 0 ¤¤¤
¤¤¤ MBR Check : ¤¤¤
+++++ PhysicalDrive0: ST2000DM001-1ER164 +++++
--- User ---
[MBR] 642feba65e4ba1bd48e23787efc3f568
[BSP] e3057bbbf924981ced9eafc3860aa8f2 : Windows Vista/7/8 MBR Code
Partition table:
0 - [ACTIVE] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 500 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 1026048 | Size: 1907226 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
User = LL1 ... OK
User = LL2 ... OK
+++++ PhysicalDrive1: Samsung SSD 750 EVO 120GB +++++
--- User ---
[MBR] 58e3e89355e09d6c35118d9f3cbb5fb1
[BSP] 07ab9512570be37407ce6906e72aefe9 : Windows Vista/7/8 MBR Code
Partition table:
0 - [XXXXXX] NTFS (0x7) [VISIBLE] Offset (sectors): 2048 | Size: 114020 MB [Windows Vista/7/8 Bootstrap | Windows Vista/7/8 Bootloader]
1 - [XXXXXX] ACER (0x27) [VISIBLE] Offset (sectors): 233515008 | Size: 450 MB
User = LL1 ... OK
User = LL2 ... OK
 

Unfortunately this adware seems very persistent.



#15 gesman5000

gesman5000
  • Topic Starter

  • Members
  • 25 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:11:35 AM

Posted 26 December 2016 - 12:47 PM

I am almost 100% certain that the virus got onto the OS or it is in the router. In what way is the best to remove this virus i did a win 10 reset but it did not work.






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users