Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

chrome adware redirect to blinq.com


  • This topic is locked This topic is locked
4 replies to this topic

#1 Br8ktime

Br8ktime

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:54 AM

Posted 19 January 2017 - 08:03 PM

Hi,

 

I've got some sort of adware on my computer I can't figure out how to get rid of. It happens only when the following are true:

 

  • the browser is chrome
  • the user logged into chrome is "timothyDOT(lastname)@gmail".

 

It doesn't matter what the user account on the computer is. 

 

What happens:

The first time a chrome browser window is opened, the home page is redirected to https://www.blinq.com/?utm_source=2094444&utm_medium=cj&utm_campaign=12121341

 

Logs are attached, thanks in advance.

Attached Files



BC AdBot (Login to Remove)

 


#2 nasdaq

nasdaq

  • Malware Response Team
  • 38,594 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:54 AM

Posted 24 January 2017 - 10:14 AM

Hello, Welcome to BleepingComputer.
I'm nasdaq and will be helping you.

If you can please print this topic it will make it easier for you to follow the instructions and complete all of the necessary steps in the order listed.
===

--RogueKiller--
  • Download & SAVE to your Desktop Download RogueKiller
  • Quit all programs that you may have started.
  • Please disconnect any USB or external drives from the computer before you run this scan!
  • For Vista or above, right-click the program file and select "Run as Administrator"
  • Accept the user agreements.
  • Execute the scan and wait until it has finished.
  • If a Windows opens to explain what [PUM's] are, read about it.
  • Click the RoguKiller icon on your taksbar to return to the report.
  • Click open the Report
  • Click Export TXT button
  • Save the file as ReportRogue.txt
  • Click the Remove button to delete the items in RED
  • Click Finish and close the program.
  • Locate the ReportRogue.txt file on your Desktop and copy/paste the contents in your next.
=======

Temporarily disable your AV program so it does not interfere.
Info on how to disable your security applications How To Temporarily Disable Your Anti-virus, Firewall And Anti-malware Programs - Security Mini-Guides.

Download Zoek tool from here

When the download appears, save to the Desktop.
On the Desktop, right-click the Zoek.exe file and select: Run as Administrator
(Give it a few seconds to appear.)

Next, copy/paste the entire script inside the code box below to the input field of Zoek:
createsrpoint;
autoclean;
emptyclsid;
emptyffcache;
FFdefaults;
emptyiecache;
iedefaults;
emptychrcache;
CHRdefaults;
emptyalltemp;
emptyfolderscheck;delete
ipconfig /flushdns;b
Now...
Close any open Browsers.
Click the Run script button, and wait. It takes a few minutes to run all the script.

When the tool finishes, the zoek-results.log is opened in Notepad.
The log is also found on the systemdrive, normally C:\
If a reboot is needed, the log is opened after the reboot.

Please attach the zoek-results.log in your reply.
===

Also, please provide an update on how the computer is behaving after running the above script.

#3 Br8ktime

Br8ktime
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:54 AM

Posted 24 January 2017 - 08:37 PM

Hi Nasdaq,

 

Thank you for your reply. I followed the instructions and the adware behavior has now stopped. Logs are attached.

 

I get the sense that this must have been some Chrome extension that was able to hide itself after being installed. One of the programs actually wiped out all Chrome extensions for all users, but I'm happy to get rid of the adware...I can put the other extensions back no problem.

 

Thanks again.

Attached Files



#4 Br8ktime

Br8ktime
  • Topic Starter

  • Members
  • 6 posts
  • OFFLINE
  •  
  • Local time:04:54 AM

Posted 24 January 2017 - 09:04 PM

OK, I solved the mystery: the user in question had the start page set to a blank page, but instead of "about:blank" it was set to "about.blank". For reasons I can't understand, "about.blank" redirects to https://www.blinq.com. (OK, I'm a bit embarrassed that it was something this simple, but perhaps this info will be of help to someone else in the future.)

 

Out of curiosity, I checked to see if ".blank" is registered as a TLD, but it doesn't appear to be the case. So I really don't know how such a redirect could even exist for such a URL.



#5 nasdaq

nasdaq

  • Malware Response Team
  • 38,594 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Montreal, QC. Canada
  • Local time:04:54 AM

Posted 25 January 2017 - 08:44 AM

Thank you for the feedback.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users