Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

I found malware, but cannot get rid of it


  • Please log in to reply
23 replies to this topic

#1 trauts14

trauts14

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 27 December 2016 - 01:16 PM

Eset online scanner found 4 malicious items. Malwarebytes will not properly remove what it finds and will not create a log for me. The computer is super slow and no proxy appears to be in place for what it is worth. Any assistance is greatly appreciated. Thank you.

I am using win7 . I attached what Eset online scanner found:


Edited by hamluis, 27 December 2016 - 01:37 PM.
Moved from MRL to Am I Infected - Hamluis.


BC AdBot (Login to Remove)

 


#2 buddy215

buddy215

  • BC Advisor
  • 12,908 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:08 PM

Posted 27 December 2016 - 07:25 PM

You can copy and paste Eset results.

 

Try this: Boot into safe mode with networking and then attempt to scan using MBAM. If that doesn't work then uninstall MBAM and

reinstall. Use the instructions below for reinstalling, scanning and posting the results. If the scanning completes and MBAM asks you to

reboot...do that.

 

download Malwarebytes to your desktop.

  • Double-click mb3-setup-1878.1878-3.4.5.2467.exe and follow the prompts to install the program.
  • Then click Finish.
  • Once the program has fully updated, select Scan Now on the Dashboard. Or select the Threat Scan from the Scan menu.
  • If another update of the definitions is available, it will be implemented before the rest of the scanning procedure.
  • When the scan is complete, make sure that all Threats are selected, and click Remove Selected.
  • Restart your computer when prompted to do so.
  • The Scan log is available throughout History ->Application logs. Please post it contents in your next reply.

 

Back in regular mode...follow directions below.

 

Use CCleaner to remove Temporary files, program caches, cookies, logs, etc. Use the Default settings. No need to use the

Registry Cleaning Tool...risky. Pay close attention while installing and UNcheck offers of toolbars....especially Google.

After install, open CCleaner and run by clicking on the Run Cleaner button in the bottom right corner.

CCleaner - PC Optimization and Cleaning - Free Download

 

Download AdwCleaner by Xplode onto your desktop.

  • Close all open programs and internet browsers.
  • Double click on adwcleaner.exe to run the tool.
  • Click on Scan button.
  • When the scan has finished click on Clean button.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the contents of that logfile with your next reply.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
  • download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#3 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 28 December 2016 - 07:18 AM

Thank you. I will do this and provide results.



#4 buddy215

buddy215

  • BC Advisor
  • 12,908 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:08 PM

Posted 28 December 2016 - 08:50 AM

Would like to see what Eset found, too.

The ESET Online Scanner saves a log file after running, which can be examined or sent in to ESET for further analysis. To view the log file, Show hidden files and folders must be enabled. New logs are appended to the existing log files when multiple scans are run. 

The path to the log file is the following: C:\users\%userprofile%\appdata\local\temp\log.txt


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#5 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 28 December 2016 - 07:18 PM

here are the malwarebytes results. the computer is still slow, so i had to reboot post scan in safe mode. i am going to use Ccleaner now as instructed.

 

 

Malwarebytes
www.malwarebytes.com
 
-Log Details-
Scan Date: 12/28/16
Scan Time: 6:35 PM
Logfile: results.txt
Administrator: Yes
 
-Software Information-
Version: 3.0.5.1299
Components Version: 1.0.43
Update Package Version: 1.0.881
License: Free
 
-System Information-
OS: Windows 7 Service Pack 1
CPU: x64
File System: NTFS
User: Stuart-HP\Stuart
 
-Scan Summary-
Scan Type: Threat Scan
Result: Completed
Objects Scanned: 380822
Time Elapsed: 10 min, 15 sec
 
-Scan Options-
Memory: Enabled
Startup: Enabled
Filesystem: Enabled
Archives: Enabled
Rootkits: Disabled
Heuristics: Enabled
PUP: Enabled
PUM: Enabled
 
-Scan Details-
Process: 0
(No malicious items detected)
 
Module: 0
(No malicious items detected)
 
Registry Key: 0
(No malicious items detected)
 
Registry Value: 0
(No malicious items detected)
 
Data Stream: 0
(No malicious items detected)
 
Folder: 0
(No malicious items detected)
 
File: 0
(No malicious items detected)
 
Physical Sector: 0
(No malicious items detected)
 
 
(end)


#6 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 28 December 2016 - 07:29 PM

ADW results:  # AdwCleaner v6.041 - Logfile created 28/12/2016 at 19:26:34

# Updated on 16/12/2016 by Malwarebytes
# Database : 2016-12-26.3 [Server]
# Operating System : Windows 7 Professional Service Pack 1 (X64)
# Username : Stuart - STUART-HP
# Running from : C:\Users\Stuart\Desktop\AdwCleaner.exe
# Mode: Scan
 
 
 
***** [ Services ] *****
 
No malicious services found.
 
 
***** [ Folders ] *****
 
No malicious folders found.
 
 
***** [ Files ] *****
 
No malicious files found.
 
 
***** [ DLL ] *****
 
No malicious DLLs found.
 
 
***** [ WMI ] *****
 
No malicious keys found.
 
 
***** [ Shortcuts ] *****
 
No infected shortcut found.
 
 
***** [ Scheduled Tasks ] *****
 
No malicious task found.
 
 
***** [ Registry ] *****
 
No malicious registry entries found.
 
 
***** [ Web browsers ] *****
 
No malicious Firefox based browser items found.
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Default\Web data] - aol.com
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Default\Web data] - ask.com
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Profile 3\Web data] - aol.com
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Profile 3\Web data] - ask.com
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Profile 3\Web data] - ask.com__
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Profile 3\Web data] - isearch.avg.com
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Profile 3\Web data] - bing.com_
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Profile 3\Web data] - ask.com_
Chrome pref Found:  [C:\Users\Stuart\AppData\Local\Google\Chrome\User Data\Profile 3\Web data] - websearch.ask.com
 
*************************
 
C:\AdwCleaner\AdwCleaner[S1].txt - [721 Bytes] - [26/12/2016 14:37:55]
C:\AdwCleaner\AdwCleaner[S2].txt - [721 Bytes] - [26/12/2016 14:46:41]
C:\AdwCleaner\AdwCleaner[S3].txt - [2075 Bytes] - [28/12/2016 19:26:34]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S3].txt - [2148 Bytes] ##########


#7 buddy215

buddy215

  • BC Advisor
  • 12,908 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:08 PM

Posted 28 December 2016 - 07:34 PM

Rerun AdwCleaner and be sure to click on Clean when scan finishes....that will get rid of the junk it found. It will likely ask you to reboot

to finish.

 

Were you able to find the Eset log?


Edited by buddy215, 28 December 2016 - 07:36 PM.

“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#8 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 28 December 2016 - 07:44 PM

JRT will not let me run as admin. i had to run as NONadmin. Could not create restore point. Results are below:

 

 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Malwarebytes
Version: 8.1.0 (12.05.2016)
Operating System: Windows 7 Professional x64 
Ran by Stuart (Limited) on Wed 12/28/2016 at 19:40:13.06
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
File System: 26 
 
Successfully deleted: C:\Users\Stuart\AppData\Local\crashrpt (Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Roaming\4027 (Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\12A99DUF (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4VWTV2I6 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8OOZ7WEW (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AG4QHRB9 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B7GVC1ES (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EZ33709W (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IZQIVQF0 (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder) 
Successfully deleted: C:\Users\Stuart\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LVY26QMP (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0PS72R2M (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\12A99DUF (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\4VWTV2I6 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\62AXOPQ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8OOZ7WEW (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AG4QHRB9 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B7GVC1ES (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EZ33709W (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FZG8CKJ5 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IZQIVQF0 (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LIXMVQOA (Temporary Internet Files Folder) 
Successfully deleted: C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LVY26QMP (Temporary Internet Files Folder) 
 
 
 
Registry: 0 
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 12/28/2016 at 19:41:47.97
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


#9 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 28 December 2016 - 07:47 PM

I do not see a log.exe in the directory path you mentioned. i did take a screenshot of the results yesterday which showed trojans. is there a way to post a picture here?



#10 buddy215

buddy215

  • BC Advisor
  • 12,908 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:08 PM

Posted 28 December 2016 - 07:53 PM

You can use one of the image hosting sites....like imgur or photo bucket. Or you can type out just the malware name Eset used for what it found...whichever

is easier for you.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#11 buddy215

buddy215

  • BC Advisor
  • 12,908 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:West Tennessee
  • Local time:11:08 PM

Posted 28 December 2016 - 07:58 PM

Your comment about how you were able to scan with JRT is rather odd. Haven't seen that before. I'll see what I can find out about that.

 

I think it best to scan for rootkits, too.

 

  • Warning! Malwarebytes Anti-Rootkit needs to be run from an account with administrator rights.
  • Double click on downloaded file. OK self extracting prompt.
  • MBAR will start. Click "Next" to continue.
  • Click in the following screen "Update" to obtain the latest malware definitions.
  • Once the update is complete select "Next" and click "Scan".
  • When the scan is finished and no malware has been found select "Exit".
  • If malware was detected, make sure to check all the items and click "Cleanup". Reboot your computer.
  • Open the MBAR folder located on your Desktop and paste the content of the following files in your next reply:
  • "mbar-log-{date} (xx-xx-xx).txt"
  • "system-log.txt"


NOTE. If you see This version requires you to completely exit the Anti Malware application message right click on the Malwarebytes Anti-Malware icon in the system tray and click on Exit.


“Every atom in your body came from a star that exploded and the atoms in your left hand probably came from a different star than your right hand. It really is the most poetic thing I know about physics...you are all stardust.”Lawrence M. Krauss

A 1792 U.S. penny, designed in part by Thomas Jefferson and George Washington, reads “Liberty Parent of Science & Industry.”


#12 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 28 December 2016 - 08:10 PM

qdVUSC2.jpg



#13 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 28 December 2016 - 08:16 PM

after right clicking JRT and selecting run as admin, here is what i get: 5pfC8f2.jpg


i am preparing to run malwarebytes anti-rootkit.....



#14 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 29 December 2016 - 05:09 AM

Malwarebytes Anti-Rootkit BETA 1.9.3.1001
www.malwarebytes.org
 
Database version:
  main:    v2016.12.28.09
  rootkit: v2016.11.20.01
 
Windows 7 Service Pack 1 x64 NTFS (Safe Mode/Networking)
Internet Explorer 11.0.9600.18537
Stuart :: STUART-HP [administrator]
 
12/28/2016 8:21:18 PM
mbar-log-2016-12-28 (20-21-18).txt
 
Scan type: Quick scan
Scan options enabled: Anti-Rootkit | Drivers | MBR | Physical Sectors | Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken
Scan options disabled: 
Objects scanned: 326095
Time elapsed: 55 minute(s), 52 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 0
(No malicious items detected)
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 0
(No malicious items detected)
 
Physical Sectors Detected: 0
(No malicious items detected)
 
(end)


#15 trauts14

trauts14
  • Topic Starter

  • Members
  • 100 posts
  • OFFLINE
  •  
  • Local time:11:08 PM

Posted 29 December 2016 - 05:14 AM

i raN adw again. below are the results:

 

# AdwCleaner v6.041 - Logfile created 29/12/2016 at 05:11:39
# Updated on 16/12/2016 by Malwarebytes
# Database : 2016-12-26.3 [Local]
# Operating System : Windows 7 Professional Service Pack 1 (X64)
# Username : Stuart - STUART-HP
# Running from : C:\Users\Stuart\Desktop\AdwCleaner.exe
# Mode: Scan
 
 
 
***** [ Services ] *****
 
No malicious services found.
 
 
***** [ Folders ] *****
 
No malicious folders found.
 
 
***** [ Files ] *****
 
No malicious files found.
 
 
***** [ DLL ] *****
 
No malicious DLLs found.
 
 
***** [ WMI ] *****
 
No malicious keys found.
 
 
***** [ Shortcuts ] *****
 
No infected shortcut found.
 
 
***** [ Scheduled Tasks ] *****
 
No malicious task found.
 
 
***** [ Registry ] *****
 
No malicious registry entries found.
 
 
***** [ Web browsers ] *****
 
No malicious Firefox based browser items found.
No malicious Chromium based browser items found.
 
*************************
 
C:\AdwCleaner\AdwCleaner[C0].txt - [2191 Bytes] - [28/12/2016 19:29:44]
C:\AdwCleaner\AdwCleaner[S1].txt - [721 Bytes] - [26/12/2016 14:37:55]
C:\AdwCleaner\AdwCleaner[S2].txt - [721 Bytes] - [26/12/2016 14:46:41]
C:\AdwCleaner\AdwCleaner[S3].txt - [2227 Bytes] - [28/12/2016 19:26:34]
C:\AdwCleaner\AdwCleaner[S4].txt - [1297 Bytes] - [29/12/2016 05:11:39]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S4].txt - [1370 Bytes] ##########





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users