Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

rambler.ru fast search malware hijacker trojan virus


  • This topic is locked This topic is locked
6 replies to this topic

#1 jacemace

jacemace

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:06:28 PM

Posted 14 January 2017 - 12:18 AM

Hi, I got the rambler.ru fast search malware trojan virus from downloading the free version of Super video installer. It turned browser shortcuts in the taskbar to spyware, and did many other things.

I've done the cleaning with malwarebytes am/asdwcleaner, zemana am, hitman pro, emsisoft ek, etc.

I also did some system restores; but I think I did one too many; and even undid one; and interrupted a restore while it was running.

Now the problem is that on windows boot, the windows file RelPost.exe, which google says is part of windows diagnosis and recovery, runs every time - and really slows the boot down, and stops a few items from loading.(I also ran tweaking.com, and did all the repairs.)

 

I can not not find any help on disabling relpost.exe, and stopping it from starting. I have tried some msconfig edits, and some other repairs; nothing fixed it yet.


Edited by jacemace, 14 January 2017 - 12:52 AM.


BC AdBot (Login to Remove)

 


#2 jacemace

jacemace
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:06:28 PM

Posted 14 January 2017 - 12:50 AM

​Quick update - so I went into windows startup settings and chose number 2, enable boot logging, which I don't think I did before - I usually choose number 5, safe mode with networking.

Windows started up really quickly, quicker than usual; and all the apps were running. Interestingly, even relpost.exe was running, but the boot was still extra fast. Also my Hips didn't catch relpost trying to do a log a text file.

 

I booted again in regular windows boot, and it booted up a bit slow; but relpost.exe wasn't running - and all the apps started. So, tentatively, windows seems okay.

 

I will also note that parts of msconfig are greyed out - not sure if it related to the issue.


Edited by jacemace, 14 January 2017 - 12:51 AM.


#3 jacemace

jacemace
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:06:28 PM

Posted 14 January 2017 - 01:01 AM

And one recent bonus - the malware had created .ink trojan spyware browser shortcuts in my taskbar - the chrome, firefox, and ie shortcuts were affected; but not seamonkey and vivaldi.

​When I deleted the virus short-cuts, and replaced them with the authentic ones; I could not figure out how to have the browser open, right where the shortcut is in the taskbar - the browser would open somewhere else in the taskbar. I just found you have the browser open first, and then create the shortcut.

​So far, the only thing left, this malware has done, is made it so chrome can't download crx extensions from the chrome store. I tried downloading a nightly version of chrome, with the blue symbol, and not the usual one. I used revo uninstaller to uninstall the previous chrome; but i think a user profile was left behind. When I went to urls in the nightly chrome, it remembered the previous chrome urls. If anyone knows how the fix the chrome extension crx error, that would help. Right now, I have to go to a chrome crx download site.



#4 jacemace

jacemace
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:06:28 PM

Posted 14 January 2017 - 02:47 AM

​Things are looking good for windows now - will post again if any help is needed.

​Watch for malware that you give permission to, hidden in installers.

​I try to use Hips, and software like unchecky - but malware in installers is not always caught.



#5 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,769 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 PM

Posted 19 January 2017 - 12:20 AM

Hello and welcome to Bleeping Computer!

I am HelpBot: an automated program designed to help the Bleeping Computer Staff better assist you! This message contains very important information, so please read through all of it before doing anything.

We apologize for the delay in responding to your request for help. Here at Bleeping Computer we get overwhelmed at times, and we are trying our best to keep up. Please note that your topic was not intentionally overlooked. Our mission is to help everyone in need, but sometimes it takes just a little longer to get to every request for help. No one is ignored here.

To help Bleeping Computer better assist you please perform the following steps:

***************************************************

step1.gif In order to continue receiving help at BleepingComputer.com, YOU MUST tell me if you still need help or if your issue has already been resolved on your own or through another resource! To tell me this, please click on the following link and follow the instructions there.

CLICK THIS LINK >>> https://www.bleepingcomputer.com/logreply/637352 <<< CLICK THIS LINK



If you no longer need help, then all you needed to do was the previous instructions of telling me so. You can skip the rest of this post. If you do need help please continue with Step 2 below.

***************************************************

step2.gifIf you still need help, I would like you to post a Reply to this topic (click the "Add Reply" button in the lower right hand of this page). In that reply, please include the following information:

  • If you have not done so already, include a clear description of the problems you're having, along with any steps you may have performed so far.
  • A new FRST log. For your convenience, you will find the instructions for generating these logs repeated at the bottom of this post.
    • Please do this even if you have previously posted logs for us.
    • If you were unable to produce the logs originally please try once more.
    • If you are unable to create a log please provide detailed information about your installed Windows Operating System including the Version, Edition and if it is a 32bit or a 64bit system.
    • If you are unsure about any of these characteristics just post what you can and we will guide you.
  • Please tell us if you have your original Windows CD/DVD available.
  • Upon completing the above steps and posting a reply, another staff member will review your topic and do their best to resolve your issues.

Thank you for your patience, and again sorry for the delay.

***************************************************

We need to see some information about what is happening in your machine. Please perform the following scan again:

  • Download FRST by Farbar from the following link if you no longer have it available and save it to your destop.

    FRST Download Link

  • When you go to the above page, there will be 32-bit and 64-bit downloads available. Please click on the appropriate one for your version of Windows. If you are unsure as to whether your Windows is 32-bit or 64-bit, please see this tutorial.
  • Double click on the FRST icon and allow it to run.
  • Agree to the usage agreement and FRST will open. Do not make any changes and click on the Scan button.
  • Notepad will open with the results.
  • Post the new logs as explained in the prep guide.
  • Close the program window, and delete the program from your desktop.


As I am just a silly little program running on the BleepingComputer.com servers, please do not send me private messages as I do not know how to read and reply to them! Thanks!

#6 jacemace

jacemace
  • Topic Starter

  • Members
  • 12 posts
  • OFFLINE
  •  
  • Local time:06:28 PM

Posted 21 January 2017 - 10:59 PM

Hi, things seem okay now - I have had long boot times though - an extra two minutes.

I used windows performance monitor and analyzer to look at the boot - and svchost is taking that extra two minutes of time.

I had done a system restore, and accidentally interrupted the first one, before the second one went through and finished.

Now I think the malware may be gone, but windows has and error - I have done scan disk, and check disk - with no results.

I will say that my HIPS program has caught a windows system file on startup, that never appeared before. It is called relpost.exe, in the windows system32 folder. relpost.exe is part of windows diagnosis and recovery. I have scanned relpost.exe with hitman pro, malwarebytes, and zemana - and it is good. I think windows is accidentally trying to do a startup recovery, every time it starts. I looked at msconfig, but couldn't find anything.

Things seem better now, and windows boot is back to a decent startup, without the extra two minutes.

I was wondering if anyone had this experience - I think it happened because I accidentally interrupted a system restore. And I got to that system restore through windows recovery safe boot mode - so I think this "fouled up and confused" windows boot.



#7 HelpBot

HelpBot

    Bleepin' Binary Bot


  • Bots
  • 12,769 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:10:28 PM

Posted 24 January 2017 - 12:25 AM

Hello again!

I haven't heard from you in 5 days. Therefore, I am going to assume that you no longer need our help, and close this topic.

If you do still need help, please send a Private Message to any Moderator within the next five days. Be sure to include a link to your topic in your Private Message.

Thank you for using Bleeping Computer, and have a great day!




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users